Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 08:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://go.onelink.me/107872968?pid=InProduct&c=Global_Internal_YGrowth_AndroidEmailSig__AndroidUsers&af_wl=ym&af_sub1=Internal&af_sub2=Global_YGrowth&af_sub3=EmailSignature&af_web_dp=https%3A%2F%2Fhermestravel.ir%2Fnb%2F%2F%2Femail%2Fauth%2F%2Flhlrtm%2F%2F%[email protected]
Resource
win10v2004-20230220-en
General
-
Target
http://go.onelink.me/107872968?pid=InProduct&c=Global_Internal_YGrowth_AndroidEmailSig__AndroidUsers&af_wl=ym&af_sub1=Internal&af_sub2=Global_YGrowth&af_sub3=EmailSignature&af_web_dp=https%3A%2F%2Fhermestravel.ir%2Fnb%2F%2F%2Femail%2Fauth%2F%2Flhlrtm%2F%2F%[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133238628681424842" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 472 chrome.exe 472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3908 wrote to memory of 4268 3908 chrome.exe 89 PID 3908 wrote to memory of 4268 3908 chrome.exe 89 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 2172 3908 chrome.exe 90 PID 3908 wrote to memory of 4924 3908 chrome.exe 91 PID 3908 wrote to memory of 4924 3908 chrome.exe 91 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92 PID 3908 wrote to memory of 4768 3908 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://go.onelink.me/107872968?pid=InProduct&c=Global_Internal_YGrowth_AndroidEmailSig__AndroidUsers&af_wl=ym&af_sub1=Internal&af_sub2=Global_YGrowth&af_sub3=EmailSignature&af_web_dp=https%3A%2F%2Fhermestravel.ir%2Fnb%2F%2F%2Femail%2Fauth%2F%2Flhlrtm%2F%2F%[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8f08d9758,0x7ff8f08d9768,0x7ff8f08d97782⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:22⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:82⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:82⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4624 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:12⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4916 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3492 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:82⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3972 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:82⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4628 --field-trial-handle=1812,i,10343840321887557384,17241058401957239032,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD533571290c1f1b70edde0e3aa68755852
SHA1cbfb06591a8eb4e015985b9ec90ee6e0c9f08770
SHA2561de7c3d94903fec0619d51b8ccbd15230603d0fb61c100078ec7d31c46bb03da
SHA5129660ba4c798b6af3fb2c1eaf0f597e449a1daf3d31a2a0e19d0a768c438fc749d548090969ad6408afc6d71afc634c940dc848f449b025356281bcbb669969ca
-
Filesize
2KB
MD5d94e7df038dbb7bb0b0f31b2b9c4de38
SHA1ae3e814e747bb4ca1ddd4d8f0783d14021537560
SHA2560f96ec714b0062236ead35ca2842cf79d000fa5c102041d00aac9dc303a77c13
SHA5127b9cbf3d0f2a8375fba0279808f3e80162cf078dd3ca3e47a61f48ee0dd2f7d0e75e0d79071e9c2fbd1e1e6b30764fbae91b509a9e7158f70b3e0c2cc6d20d8b
-
Filesize
706B
MD50c8b5eb1fcc738747ebc1e21b480eda1
SHA1157f69e4fef6be4aa3365d6d004c8f53fe884976
SHA25618cdf33b76119abf0ca6d58f1f71ee4ef2fef1a49a571c12fe1e5dc5c43e3240
SHA512d4a4e5759b8411dd3c48c56c39f7df43870d8647bd8a85afd041e6abd751e7995f8594aabcfefd78dc643db959bd3a899ab6944bc79ae23cfbd79ba6f1628098
-
Filesize
6KB
MD570dee009445f6db7d1696f36974f494f
SHA1cb258b29d7d7f87d742117d2a4b7c5d0bede0f10
SHA2560864d36b5adecffb304497d518f921e45fbd9136a7c0d279d58d6570ee9bef5a
SHA512f88c431537c8f198354ae2bd1be844ad4352b988296699d291f0843915c48532e5ba1be2df229f165f743c3f779a368dc904881fcd1c6b108c82290f69b75879
-
Filesize
15KB
MD5bd99e1f60581982b054f154a8ba7f974
SHA12edc7453b907b8dbec89bd3d21e8685f808f5f68
SHA2560cb7e8dd01c81508460b988136024d846504a203491768fe7506076961b07a78
SHA5126924e75ec89a65d064993626df428edb892bc006ed2ac0d86178051f50c8f09585a35f185ee35aa2e4b995f37f2a624b6e4b49dfd609ad7a9fe753b246c00a9f
-
Filesize
144KB
MD53d858897e6e709b2acd9fae07bf89bde
SHA10f8125e09f3448d5e60321867fb1a2aff7ce032d
SHA25637ff7723d8d8abf8de43abf7b00790396d86d2b63013e4ae0a0e6e0ce89a480b
SHA5125e455212e0e12a2f6f57eb6d5eec7f90909646866b6a4a0d4722139dbf47fdd1f0746a10a8bf96c9a52ce9ae05ed8f597cbc09b8eb24b5b0dca80790df497e4c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd