Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/03/2023, 15:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3laFSid
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
https://bit.ly/3laFSid
Resource
win7-20230220-en
General
-
Target
https://bit.ly/3laFSid
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133234584833732978" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1008 chrome.exe 1008 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1008 chrome.exe Token: SeCreatePagefilePrivilege 1008 chrome.exe Token: SeShutdownPrivilege 1008 chrome.exe Token: SeCreatePagefilePrivilege 1008 chrome.exe Token: SeShutdownPrivilege 1008 chrome.exe Token: SeCreatePagefilePrivilege 1008 chrome.exe Token: SeShutdownPrivilege 1008 chrome.exe Token: SeCreatePagefilePrivilege 1008 chrome.exe Token: SeShutdownPrivilege 1008 chrome.exe Token: SeCreatePagefilePrivilege 1008 chrome.exe Token: SeShutdownPrivilege 1008 chrome.exe Token: SeCreatePagefilePrivilege 1008 chrome.exe Token: SeShutdownPrivilege 1008 chrome.exe Token: SeCreatePagefilePrivilege 1008 chrome.exe Token: SeShutdownPrivilege 1008 chrome.exe Token: SeCreatePagefilePrivilege 1008 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe 1008 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1008 chrome.exe 1008 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1008 wrote to memory of 4280 1008 chrome.exe 66 PID 1008 wrote to memory of 4280 1008 chrome.exe 66 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 4624 1008 chrome.exe 68 PID 1008 wrote to memory of 2424 1008 chrome.exe 69 PID 1008 wrote to memory of 2424 1008 chrome.exe 69 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70 PID 1008 wrote to memory of 948 1008 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bit.ly/3laFSid1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffec8c39758,0x7ffec8c39768,0x7ffec8c397782⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1864,i,14860210727459823068,10116225521641882815,131072 /prefetch:22⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1864,i,14860210727459823068,10116225521641882815,131072 /prefetch:82⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1864,i,14860210727459823068,10116225521641882815,131072 /prefetch:82⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1864,i,14860210727459823068,10116225521641882815,131072 /prefetch:12⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1864,i,14860210727459823068,10116225521641882815,131072 /prefetch:12⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4528 --field-trial-handle=1864,i,14860210727459823068,10116225521641882815,131072 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1864,i,14860210727459823068,10116225521641882815,131072 /prefetch:82⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2964 --field-trial-handle=1864,i,14860210727459823068,10116225521641882815,131072 /prefetch:82⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD50131d7467e2d3dc1f3a9aef1fba07b47
SHA1afb50a187e2eae8b6cab8ebcd79a581d05850a74
SHA256761966101fd7701ea5c1ae38385390d8a66b5529dc12c05aca6be8aa960aab50
SHA512f434a00c014b64a51fb717366c6a351abdcdd52620f36271200f8e47a7fbe2490ed66581bd6836fec89f53e29d04e476223330b18c8089bfae305dff3d2d2fb7
-
Filesize
1KB
MD52c6a4092d3b2c1a2a3a71c5fcd87f731
SHA195e0b7594d660fdbfadc4fe31d46bd6b0bdd0db4
SHA256a17d73078dada31921b538e76f5c73914cabe79f493c29cef1c288f0dd717af2
SHA5121575cce67a207e822800b770dcccb4e42c6ebe4f8fbb62c9a8262ef21c0a3023109838394599866a767ee3838ea46e1ff63936310ced5e67432df669e62e38a0
-
Filesize
874B
MD5f4217304cdd70d59f67718c930c8b0cc
SHA11bd2c5c8136ddc2af9bcd25b6d490625720e617a
SHA2564dde2f3e8307b312504b253154ab3e769fa54f76c71405c1d407adc8aa959544
SHA5122b42d6935deb537cdedbd51a89ee91d479ea23abdbf7910090a2dd38d51797bc490b3229039fcde4bc15f6cdc277078f445edfefedd2b92c62ba25887b21b310
-
Filesize
6KB
MD5fbe150342663fcf53cfe638403a58bb2
SHA1c5df48ef47fb9d99f031eb1b9274c467a7065dce
SHA256f8d620ce9e3f1c521ebd6f9934d4d5ddb1bdf10f5c8ef4299420c462976b82bb
SHA5128dd3e9c6edb4c9d394d1c68fa61783c353d44079069718f87ca69247000548f3becf2eb0facb5f26a9bbb03f4ffd179390675a85975d936c19ea8a043cf41a1a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
72KB
MD5fdec83e83298a384a58a226861615134
SHA1fe9da09a064ca29b438294852c41b5f034916def
SHA256e8e204a3d7f4b094364db00f23ab003ce49eb45a5cadbf26a6aa176e74cc2254
SHA512fd31147665d22883fe3c0261910cb8745d9dde34136aa95391135d23d8de370f5c1a39319228104d729712f5200f5252b502f373cab7b5cb4c0f770f0390559d
-
Filesize
144KB
MD5c69c91dd97764a491dc604d77acd14f8
SHA1f4bed55e54f2a9ba7b0ce720c563a149e8fedc6d
SHA2564a71b94efb9cd28d345610ab195531a101ed9a6f3d73d10995f4df00f64a00b3
SHA5120936348e8ae10c9e3f6e88e11a9449eb873c93a51d2f6cec6ae826f8dd696bf5e3627b2da897c58008245a3ae774f4fe9f93e2564c67480f7e81e164a9010791
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd