Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2023, 15:14
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://duquetrading.com/ym/auth/dpgx6k/[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://duquetrading.com/ym/auth/dpgx6k/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133231976658322369" chrome.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1220 chrome.exe 1220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1836 wrote to memory of 4832 1836 chrome.exe 86 PID 1836 wrote to memory of 4832 1836 chrome.exe 86 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 224 1836 chrome.exe 87 PID 1836 wrote to memory of 3860 1836 chrome.exe 88 PID 1836 wrote to memory of 3860 1836 chrome.exe 88 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89 PID 1836 wrote to memory of 3856 1836 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://duquetrading.com/ym/auth/dpgx6k/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff8b2b29758,0x7ff8b2b29768,0x7ff8b2b297782⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:22⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:12⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:82⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5172 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:82⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:82⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=972 --field-trial-handle=1824,i,10989465752809047769,9441180738680048815,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5fd14af301a59813012f6f6de61452f48
SHA196407d3a86c2ed5ba2105a63baef184e572409b8
SHA256c3130fb713a75fe9106462a27b0b9ddff3127840ef54c8a922831ed2901c5034
SHA5121c1936371f0c18dc72e076e6128e9c4ff7b449e5ae4f4205384963c22f46fee0332e83e0dc11aa9f7a5c881ea5e32d3cb661ed9ccdf46eb4be37edd84ca1f7d5
-
Filesize
2KB
MD5f1f747556f2f87dac33aec6543967ec0
SHA113daead770240f60aea0718b6394334679d703af
SHA2567e3dab3d67b63da8d8069e3780101168ec08cd228d16876d920ef281f4f20170
SHA512e8063e9855c7cc5176bd7835c03812021b701355ce8e7153ff671ee995ad9c5805659948f4ae82e946f7389964463aa4ca25b185dd692a8bff092ec9d065c26d
-
Filesize
6KB
MD557c82b5110b8794589e7a33aadc545e3
SHA1943e8e738dded19fa4aae4ea5aec43c2123703e9
SHA25677af1d9a5ced65566c236fcb546ef856d2321c261a366f92f1435b28024e6dfe
SHA51251958fd91a95761bb3f56884a61de0df1d61c53eace57017025ac77b6312a0ab0449bdf1076cba9da3bd796427364800ba76b96aedb639eb0f5e4d3b56ce3d3b
-
Filesize
15KB
MD5733fbaba08d6df9dbacc4d8db3cc280c
SHA1b5dfcd75c714c33467dcd0252da2a7ac4e4adb3a
SHA2561af010f149f9b8dfdb1abe42ffbeb46d37648e7c3680f0eec958db90a7cd5ef2
SHA512e14bc85d9d0ee4b0d7c8126c32384a4ce3a79e3c5182eb022e17a815b7419963a9130b74e22d5fac350d1db8b0878fbefa0186598a8a69d6d03bfabcda4cd6ce
-
Filesize
146KB
MD5176d7f64889ba99e69b4bc7a18f22d16
SHA1ab28c4db1856150cbcafc4e4890a6525199fb330
SHA2562fe01c52a52e11a000b6db75092db72b35f4c038eb3b98bfc1f7afbeadfbe151
SHA51260d488adf8e27c3d97dde8da1ad72f4b53380715c772739ad352f16e5e462726ce7b33f787be4623d3aa8a1c523ba6e9283fae57196fc19acae429c31ded9b61
-
Filesize
72KB
MD506dbfba921652be8c10e0ab2e718808b
SHA1602cf9072b01f795b3d0deddb13d0a99a75fb496
SHA256984c9ac17c5e7e1c1f64496aafe1fa4e574de822eafdb3e5cfe9a9f8a8146507
SHA512c481709e77ffba8e946beff7ef508c91cae65e450f4d56f845878d067410d940db778c0c00d39021b56d26ef27d83f1620a1f43810ce0e472676fd33f0a73185
-
Filesize
146KB
MD529b2893e1d5a95e3c87962ed1f113de7
SHA18e47d16746086500f71c8626558d8e7f5bac0135
SHA25687ccdfc25de39974c0a2be03dd7e3fb7b5e9656f47d55e8efee1cc3b8fbdddb2
SHA512c9ace9d2e9bf6c3c066d85fb5539b149bc8cba072da9794a505f39889e87c8f91a117066c05f73b52067d5eef49004a992af7403a18bda00417b992da467df8c
-
Filesize
145KB
MD50bacd5aa3eabaf58fb964a35ca84f274
SHA16872465347c69cb3f2eb3ef351434ea439e1b2b7
SHA2561c7a07169275bdc8cece82ddc0900680290a937bf54e6bbdbf2a4cf69ec44555
SHA512294b0f03055d7b5e276f62c15463700523fb61e8e2c6cd855b20663082ca60338029cc05a8e0e3581ef4c81b2666b9a8a90971170b864ffd057b860e86e1403a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd