Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 05:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://url9331.tst-cfexpress.com/wf/open?upn=kKLYQ91ZFOe6ryzRU3CXyrLdvoA2y22glymy6K0Z1kQOFdaUyQcy2qQxiGYj7fR1bFRKbBC49gsWPFg5QudG0HvS8SmwqRsATnO0I6AiRc4jNeTL1O04G7YT1F5FuI-2BhoSJkirYQCgqpVe6TDnK9J49VoWiBkWak6Cp0PaV2BjUMmvjm6fG3EdDE5DnfDqbv0CGVMYNaBSXPYFoQlfkYw-2FapKmdCdCVZ5jNKS4SKHVo-3D
Resource
win10v2004-20230220-en
General
-
Target
http://url9331.tst-cfexpress.com/wf/open?upn=kKLYQ91ZFOe6ryzRU3CXyrLdvoA2y22glymy6K0Z1kQOFdaUyQcy2qQxiGYj7fR1bFRKbBC49gsWPFg5QudG0HvS8SmwqRsATnO0I6AiRc4jNeTL1O04G7YT1F5FuI-2BhoSJkirYQCgqpVe6TDnK9J49VoWiBkWak6Cp0PaV2BjUMmvjm6fG3EdDE5DnfDqbv0CGVMYNaBSXPYFoQlfkYw-2FapKmdCdCVZ5jNKS4SKHVo-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133234214610058204" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5044 chrome.exe 5044 chrome.exe 3580 chrome.exe 3580 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5044 chrome.exe 5044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 3992 5044 chrome.exe 87 PID 5044 wrote to memory of 3992 5044 chrome.exe 87 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 2292 5044 chrome.exe 88 PID 5044 wrote to memory of 740 5044 chrome.exe 89 PID 5044 wrote to memory of 740 5044 chrome.exe 89 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90 PID 5044 wrote to memory of 948 5044 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://url9331.tst-cfexpress.com/wf/open?upn=kKLYQ91ZFOe6ryzRU3CXyrLdvoA2y22glymy6K0Z1kQOFdaUyQcy2qQxiGYj7fR1bFRKbBC49gsWPFg5QudG0HvS8SmwqRsATnO0I6AiRc4jNeTL1O04G7YT1F5FuI-2BhoSJkirYQCgqpVe6TDnK9J49VoWiBkWak6Cp0PaV2BjUMmvjm6fG3EdDE5DnfDqbv0CGVMYNaBSXPYFoQlfkYw-2FapKmdCdCVZ5jNKS4SKHVo-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bada9758,0x7ff9bada9768,0x7ff9bada97782⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1672,i,13566744676670916844,7118444440539769510,131072 /prefetch:22⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1672,i,13566744676670916844,7118444440539769510,131072 /prefetch:82⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1672,i,13566744676670916844,7118444440539769510,131072 /prefetch:82⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1672,i,13566744676670916844,7118444440539769510,131072 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1672,i,13566744676670916844,7118444440539769510,131072 /prefetch:12⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1672,i,13566744676670916844,7118444440539769510,131072 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4892 --field-trial-handle=1672,i,13566744676670916844,7118444440539769510,131072 /prefetch:82⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1672,i,13566744676670916844,7118444440539769510,131072 /prefetch:82⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2836 --field-trial-handle=1672,i,13566744676670916844,7118444440539769510,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ab0c10f4335e41a00cd1f1c9c7a06c1a
SHA17ca490b02d95cf287f2c93d22b4669fb214903e4
SHA256065137287406db80cc0245c349bb1bb4571965d7f009d3b5dcef529dc4c11ac5
SHA51282a32c405cd542323c34c1458502fad26f27beac30ffb32ea2926017b555ab8d785b254e3f0076101f58838508fab159c2803ad23d133d75806593ce367a27ea
-
Filesize
6KB
MD51ed113ef651ee00d5d4d1c068a36da20
SHA1fcc8d047889dc24cc912edca16ed0b10dddb3f97
SHA256de88a5d514037326fa4e36fd9dd5bc76036bc76f2feafb3f59ae237b1e0584d7
SHA512004cf3581bcd4b6cd95d122b3a0a335e715cb4161250a8ff78da4c803ffff41dab2e1de8f4bec55acd29e90ffd53827ce514b48ed008ce9ff30b251f77ef226e
-
Filesize
15KB
MD5cf50aa047f8360adb3fe6fb878b0187c
SHA118cc804f0cf89141fa7b48d749879c969340458f
SHA256be03d4b36123bbfacd17c66e0b4ff84262cb0fd0d3631118eb296da34118c8cc
SHA512e3e71adb9faf2cb9c39886096f0667c32790c263f75172215a4cabbdf0507f9aca12becf63158dde3ce65754a56a50e009d884518d21d196fd455f003d647b21
-
Filesize
142KB
MD5ce8a940494c943a35cae6e086887adda
SHA17d90d38519b587d403a78ea343c0d4bb150f83f6
SHA256f66178803dcbef38333725c4ea4144e83f86013b95ea246d4125f2876ad8624e
SHA512f85eb06731e6a69252807d4ca485af6c098819f1e9fed12f0add0b90beacbc6fa52a18192f1636028eec62a6b1f151f16b591f160b15fc1eb1277adcc7390d17
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd