Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2023, 09:46
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://spiqy.com/new/auth/gnleft/[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://spiqy.com/new/auth/gnleft/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133229188222186286" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 1092 chrome.exe 1092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeCreatePagefilePrivilege 2496 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3200 2496 chrome.exe 86 PID 2496 wrote to memory of 3200 2496 chrome.exe 86 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 2464 2496 chrome.exe 87 PID 2496 wrote to memory of 1992 2496 chrome.exe 88 PID 2496 wrote to memory of 1992 2496 chrome.exe 88 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89 PID 2496 wrote to memory of 4344 2496 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://spiqy.com/new/auth/gnleft/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd9c99758,0x7ffcd9c99768,0x7ffcd9c997782⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:22⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:82⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:82⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5180 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:82⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:82⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:82⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 --field-trial-handle=1904,i,7218122237277202240,4047186534475526723,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f8a1b8a95b912490484e79b53c0ed931
SHA1cc60a40ee231cdfe5d3bdbc163e08b26d07431e2
SHA2564db696c44be6b6de7009321746817225d9a581e7d614341ae9056b4d70553fcc
SHA512e42f9987ad2e683ae06d9628b5d47313c5b147372ce2701a86723812054f06d47955573d19a0a0bf30583d76b17190517d8e47f8ef8cac3fccb0183051e7497d
-
Filesize
6KB
MD55ec1d3e4ac055d1f22ed4be59d3868a2
SHA1f518f69dec51d4aacc26882d40c16869d92f7a45
SHA256e1a7dccdc1b177eed697a6eae36e78e34fdf146cb39aac0d7d974e1b86d2ec13
SHA512246866f9cfb2641f7aac19c3a4e122a8cde58ede10b54613b649a5187df81a9cc2b4900df7e704f964f818cfff31c16b548ad91171965aabc54d1bfe7a13d105
-
Filesize
15KB
MD59692c2e8634c74b26f5f66b84a0f6948
SHA1c1073d17a0000b6294c0eb53d80c6e5cdb9cf113
SHA256ef3eb91e112cb617b1df7f69844121d8e734e5a65e40306bd34cd37dc47664f6
SHA5127b9fe41c5d1be927745cc85836280be25d0341605004893e14ba722180c2148dcd5319951d58b9cae70acfd567058eb37218c4d07f983d8b2568db9785cf8121
-
Filesize
146KB
MD5b0e4407f3f9e7edf0d26976aa4a3d1bb
SHA12a7598dcdde88823cb6e14ea370ed1b757986bf5
SHA2566b73dc13e3963232fabf8fdf565f0710c6c384623d2732d852368d9c081a7ab7
SHA5125a3942a8bd914bd2d8d9eacec7e5019c11a570dbac481460ed22f9c640ed9a17b630e90fe92702e88ba11cf13b3373652b6cac456c2e64f7ad855fb04617e3f7
-
Filesize
145KB
MD52adc435835dcb937901a05e46758e1f5
SHA13f0665780366df071bb20f56fefc5e1dff7b0fb5
SHA25697491ee46a4c33449d668abc134bee450865e0b6423f62065f572e51784c2712
SHA512318907431a03a8b01642cac54c63c8a9cd998ed4699c925be8eb4f1e485a09d472cf0f10565447016e69b0789c5299aa45a0f7430ea7c3194f2ed0ab9bf4494a
-
Filesize
72KB
MD522c55a219d6abc8f0d2cc7a1ffec6360
SHA14113be8b9d42b8323566fd460c98cc71dd8cd53d
SHA2560e2192c8fbeb650fc5f77d9a768ce3a1956cbb2a1b963e3264932e8ee9f6baeb
SHA512c07f3ebeaab4bd14cab08f82b8aab0883ec5d5c66839af29892412fd4ae8390fcb1b5123cd7875f781f1f5b62bd44b9dfb12148b12c274aa2a1b274f8362b501
-
Filesize
145KB
MD54dc2f517a221dfa5db64d4dfaa674ee0
SHA160665e41face8b0c72d446ec9502435ba89fb161
SHA256c62ea905ff439c340c8425591819fc8df28cb28bc2a9d644d0e73ec561c8a3fa
SHA51212e5a59e5cff1130294088b58ef8bf0cb9ef4afeb53bb52f1e20313ccd322abc0a5b5fe803b8c8741cca69d2303fd853e3aeb43a5bfd703abb23f8fd249ccded
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd