Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
502s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2023, 00:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://portal.criticalimpact.com/go.cfm?a=1&eid=718d41c6a0bff72ae3e76a0e50d35c2b&c=25608&jid=5b0386da72533e4f3947229f28c3afba&d=7e964e78729e3702a6473c7b9fa19141&u=https://agathe.com.au/DEV/traditionshealth.com/[email protected]
Resource
win10v2004-20230220-en
General
-
Target
http://portal.criticalimpact.com/go.cfm?a=1&eid=718d41c6a0bff72ae3e76a0e50d35c2b&c=25608&jid=5b0386da72533e4f3947229f28c3afba&d=7e964e78729e3702a6473c7b9fa19141&u=https://agathe.com.au/DEV/traditionshealth.com/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133228861907890959" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4124 4144 chrome.exe 87 PID 4144 wrote to memory of 4124 4144 chrome.exe 87 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 4544 4144 chrome.exe 88 PID 4144 wrote to memory of 2100 4144 chrome.exe 89 PID 4144 wrote to memory of 2100 4144 chrome.exe 89 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90 PID 4144 wrote to memory of 1896 4144 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://portal.criticalimpact.com/go.cfm?a=1&eid=718d41c6a0bff72ae3e76a0e50d35c2b&c=25608&jid=5b0386da72533e4f3947229f28c3afba&d=7e964e78729e3702a6473c7b9fa19141&u=https://agathe.com.au/DEV/traditionshealth.com/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe6389758,0x7fffe6389768,0x7fffe63897782⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1828,i,5554066108288233059,643165867163185640,131072 /prefetch:22⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1828,i,5554066108288233059,643165867163185640,131072 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1828,i,5554066108288233059,643165867163185640,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1828,i,5554066108288233059,643165867163185640,131072 /prefetch:12⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1828,i,5554066108288233059,643165867163185640,131072 /prefetch:12⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1828,i,5554066108288233059,643165867163185640,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1828,i,5554066108288233059,643165867163185640,131072 /prefetch:82⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4864 --field-trial-handle=1828,i,5554066108288233059,643165867163185640,131072 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2776 --field-trial-handle=1828,i,5554066108288233059,643165867163185640,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD568b09816d6edcb5a39329db9ee676517
SHA18e10051461f5ced0e1fcfd1d07ed9e0982a215a5
SHA2568824244b8e1846172fdf6dfa6a086590b0b09f226f2fa5d7b3e59b7f97217e08
SHA512c7f6286fb73159197002e792ea1876e170ab7816b1c93ff051f96b25f2219546120a57a50069e124ca71c22e565de0bc5d3576f484e2f2f7d19232a9c6fe5247
-
Filesize
6KB
MD5dd17629bf527da994d54bc6e8e34cc5b
SHA1934ca81a04af832326acbea097b652c6ca900ee0
SHA2565dd9ef2fe71b73133dc9778c9ebaa75c7b4edaf6d8a8ca08c36401c8d9984db8
SHA5126796ff015bcad92851c53d2a1e536a9dd52ecff0292bf7c4aaeb08e982fed0b32c24f3f7ed142bb47a32bca347277c11845336a2fc213df817b0c5b277c46b9a
-
Filesize
15KB
MD52f802622efa433672a8b7490195055c0
SHA119ff6b10842ad293ed54a99ef68bd26d961e2b31
SHA25604a492b332a7812cfd47c1537c98ce5a66f174d09ba17da68e8491335dbac1f9
SHA51284461d07b1a764f85175c38dfe292d1d790183858369057ce72672b192b26ad053682ee421867bbb2a9ac929e983db179d9b8653c7c176b5d136330a0704f4a2
-
Filesize
143KB
MD554c935c6e2fad8bb71cf5288a4a55a9e
SHA1cca1cfb6cbc542c451c299a7a5857c5c965f97a0
SHA2563327ba89a46e3fbe834dd3334be5f6e7116a374fbccf735ce5d64dc33209d64f
SHA512359108345790d18f66d899ec89f730e2d087d4bf8266bbdae400f6bd14a5aea13e65d458c8c6135a1c971a47743927e0297c59e561525b6888f87a2cce61fc1b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd