Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
16/03/2023, 01:38
230316-b2d8zsaf5w 116/03/2023, 01:27
230316-bvjvwsaf3w 116/03/2023, 01:24
230316-bsqknaaf21 1Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
NewVoiceMail1633(29s)☏.html
Resource
win10v2004-20230220-en
General
-
Target
NewVoiceMail1633(29s)☏.html
-
Size
566B
-
MD5
97a9ddba9990f2cbc38a8d4147d31d74
-
SHA1
ee72e54484127733dc36712ef8f1c865322bd97b
-
SHA256
bc5720585c973834c0b76ed1125d9a9076f496183be03048a099f0334e0ce24a
-
SHA512
e34270b189840f2441a56289e4af5cb73a30d61a2029753e37d5fa66526dac82d135fade5176b1687687994776d66364c09af2b1c60806f81a23208bb1befde1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133234079077339846" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1544 chrome.exe 1544 chrome.exe 2960 chrome.exe 2960 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe Token: SeShutdownPrivilege 1544 chrome.exe Token: SeCreatePagefilePrivilege 1544 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe 1544 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1468 1544 chrome.exe 86 PID 1544 wrote to memory of 1468 1544 chrome.exe 86 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 5044 1544 chrome.exe 87 PID 1544 wrote to memory of 1400 1544 chrome.exe 88 PID 1544 wrote to memory of 1400 1544 chrome.exe 88 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89 PID 1544 wrote to memory of 3712 1544 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\NewVoiceMail1633(29s)☏.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d8b09758,0x7ff9d8b09768,0x7ff9d8b097782⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:22⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:12⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4700 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:12⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4800 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3272 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:12⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2628 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:12⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2772 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:12⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 --field-trial-handle=1800,i,8539254693642765691,246625730145051968,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57863d8dd31f90a1c1754249fea20c462
SHA1a21301db6e48337799b451685810cbad53027667
SHA256b6e49593e07fb48bcfe3af68bdfcf2b93f1c072de8d01793ee9564de2f4a4d5e
SHA512728b7e2d074b1e733a5cf26555681a73f1f341985a3b90b0fdd1e9dc54cfbb98b48dcaa52fd8930b539db366a81893ccc9935e9e6e111c8d6dc8312b3148670e
-
Filesize
873B
MD50a6ae1f8fd54460e9bd38c744f013130
SHA1e45865508fad724bd1fb2073cc7e211227491575
SHA2566ff6f57f48651389cefe5b8cf150fc3c018e966da32bc7f9b42f47a133ec5995
SHA5126403677fee5fe968efa23f7668a00f6050a2f3220d9d5fb91ea26753d5b9fa4f5bd2c56368d55f6eac376bf90290038a89d072cfbf82e3b4f53c73b500902a56
-
Filesize
4KB
MD5b9d8ebb7592056635021800a39079089
SHA16701ae17ade534e50784b6e0bc9fdfd0736dfc6e
SHA25691570f677e883546463dbb531cf31cb1e8881035cadb78a87a4a9272429be878
SHA5123988d149451dc8932ff6f64112eddfdcfb939788342074e196b2882289e4e4c9a6124bd29e729d08c66fc87af4488ca2807fd6b607a556b15169d48a6bcf7f5b
-
Filesize
4KB
MD5ae2cb6bc9a0434fbd02c6c5bf56a8109
SHA1a8f57710fca96239a45fad441f7f49d6ba50a5f9
SHA256233eaeda0777f71f32fb031a69cc84f57e087641f787c07849870d99a8ee1dbf
SHA51263e3d7ea7ce8cc1877a82ba6f2379a92449efbb5e200a8fc65fe33b910e2321ab50cddcf02a589678cd1e9bae1bd3808124c68442b8d0dfb30835b98e53f7dce
-
Filesize
4KB
MD5f8c4c118873adddb44f139b8a7d5e786
SHA1865b32552e0614148d8568e36f27e528df329251
SHA256954f8e53744337f4956e12ee572b78b49cdc15e29da7c34dd931447f6bbb080a
SHA51278098eaf76c540499fdb3bc2bf3151d0563a5628107b6a6965ef7dc017c8c3c2727d42a7a2ea9d25dc3c77668e55572c6605fa55f2dd318c125a6e6dfdac5e37
-
Filesize
142KB
MD574381de302528baeb1722faae7eee8be
SHA1573d2da3b66dbfdfb7cbab05086daa3467d6cd1e
SHA256d81071b1fd4f89390608e022c693f7130ed66c3fdb40cd59364bd33b1fbf51c9
SHA512623eb749a70c7680257b84f4afa00b526a163e9e7612ac767611c5bb9c192c05345e6366638b76580685c67aa1a7fc94ccdcac43772236e840908ede083da200