Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2023, 04:52

General

  • Target

    http://clickemailmkt.ahmsolution.com.br/ls/click?upn=FAZ9Oj6UHbo-2FUBIZwgcdILIk-2Bu-2FC3uvNwV3SW4NhYTvQqJ7ilBZvJtA2JVw5J6uZY0sV7-2BDYTYzQwoHtUXSjeE7qzD5hdb69qY-2FEjBMWmQow08FPHm1s9R3Iz-2BpCPuA7yxqomXLeVysRqFvLeJCv-2FDXOX9x5nHufB8DWZnZ9lBKOksUNDK4vzxreagndeRmqJM7sjyeH-2BGty-2FFLJdCEViJABrDfzTYFI93lCiYc8jNSdwWSi4bzk9XZayLQSEb5gt9hyWrTRDCmFZcR7mU6JAqGMj0OvmVSgn-2FbAM06ye-2FWsG-2BLk0rkMQJhssXzv3fNi49XfJIOQ35hSAww6Aefthg-3D-3DIZEN_ArY9ML-2BImYTkED4-2BfXS2Ct3CAhGNXSOYWBLn-2Fkt76qYojxTch0qFTfarqzA4Txyc9zyZaF7QoGkqpwltNtmMLHJCl48xa-2Bu8ztGyY6-2BQkCkgsMcNt-2FpWw2n3tco2P7vlA-2F7U7QyRp68PiLNPNkMEIZUer9tCxxHE-2Fqe6sQXcgDsVQul6ExMHr6dmlOGFf5BbfMct5mH6-2BqimR-2Bp9ujc3yw7EvOrpC-2BjPX4MoTD5rxnctY6KIj3d2jWA8ahf40-2BFXP-2FU0arqNZnPWwxfDr8QPY-2BNg-2FZPzlPwZ7pYnozrgELUEWsqn5KcqCPtWOh8F2THLFAg-2BPturdV2-2FpP36iYhajxVuJFWK5TEecxACoVqnSew96IDcdVV7nsKiduyHL6IB6Yb-2FRpKB-2BDVbFhDoOFpP7tH4KTWTkNp6-2BQt2BFg-2Frd-2BJ-2FvB9jmCMPOmHgY-2FPocVW-2BlSNEzcRPxoT4WwKQgAGfGaeFtzSEpPdBVE-2F0pQtwuM138BH7WQdmRg7zreOZNuoAKrnv-2BWEyrdq3nxAEleTTqFumnehT3kPXTJIktxebC1yCIVtFo5HRtnLfZSxSsPdz-2FL4w-2Feviu-2F4sY06G-2BSVMm-2F7B686lqg3EeiTd-2FY0aILnX60zGwsgx9cp64GLY-2Fl1ROnW0weFwrSAi1JRVrTFovQQDbycNTj30NZMwai5YrKeRaOwbFyqxKfeVup1hldcbYXr9cdXZaH5Db2SoUHZtQ-3D-3D

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://clickemailmkt.ahmsolution.com.br/ls/click?upn=FAZ9Oj6UHbo-2FUBIZwgcdILIk-2Bu-2FC3uvNwV3SW4NhYTvQqJ7ilBZvJtA2JVw5J6uZY0sV7-2BDYTYzQwoHtUXSjeE7qzD5hdb69qY-2FEjBMWmQow08FPHm1s9R3Iz-2BpCPuA7yxqomXLeVysRqFvLeJCv-2FDXOX9x5nHufB8DWZnZ9lBKOksUNDK4vzxreagndeRmqJM7sjyeH-2BGty-2FFLJdCEViJABrDfzTYFI93lCiYc8jNSdwWSi4bzk9XZayLQSEb5gt9hyWrTRDCmFZcR7mU6JAqGMj0OvmVSgn-2FbAM06ye-2FWsG-2BLk0rkMQJhssXzv3fNi49XfJIOQ35hSAww6Aefthg-3D-3DIZEN_ArY9ML-2BImYTkED4-2BfXS2Ct3CAhGNXSOYWBLn-2Fkt76qYojxTch0qFTfarqzA4Txyc9zyZaF7QoGkqpwltNtmMLHJCl48xa-2Bu8ztGyY6-2BQkCkgsMcNt-2FpWw2n3tco2P7vlA-2F7U7QyRp68PiLNPNkMEIZUer9tCxxHE-2Fqe6sQXcgDsVQul6ExMHr6dmlOGFf5BbfMct5mH6-2BqimR-2Bp9ujc3yw7EvOrpC-2BjPX4MoTD5rxnctY6KIj3d2jWA8ahf40-2BFXP-2FU0arqNZnPWwxfDr8QPY-2BNg-2FZPzlPwZ7pYnozrgELUEWsqn5KcqCPtWOh8F2THLFAg-2BPturdV2-2FpP36iYhajxVuJFWK5TEecxACoVqnSew96IDcdVV7nsKiduyHL6IB6Yb-2FRpKB-2BDVbFhDoOFpP7tH4KTWTkNp6-2BQt2BFg-2Frd-2BJ-2FvB9jmCMPOmHgY-2FPocVW-2BlSNEzcRPxoT4WwKQgAGfGaeFtzSEpPdBVE-2F0pQtwuM138BH7WQdmRg7zreOZNuoAKrnv-2BWEyrdq3nxAEleTTqFumnehT3kPXTJIktxebC1yCIVtFo5HRtnLfZSxSsPdz-2FL4w-2Feviu-2F4sY06G-2BSVMm-2F7B686lqg3EeiTd-2FY0aILnX60zGwsgx9cp64GLY-2Fl1ROnW0weFwrSAi1JRVrTFovQQDbycNTj30NZMwai5YrKeRaOwbFyqxKfeVup1hldcbYXr9cdXZaH5Db2SoUHZtQ-3D-3D
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3352
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe768e9758,0x7ffe768e9768,0x7ffe768e9778
      2⤵
        PID:396
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:2
        2⤵
          PID:3744
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:8
          2⤵
            PID:224
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:8
            2⤵
              PID:5040
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:1
              2⤵
                PID:868
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3132 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:1
                2⤵
                  PID:4544
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4524 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:1
                  2⤵
                    PID:3572
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4764 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:1
                    2⤵
                      PID:1864
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5036 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:1
                      2⤵
                        PID:616
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5240 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:1
                        2⤵
                          PID:2860
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:8
                          2⤵
                            PID:3872
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5988 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:8
                            2⤵
                              PID:3696
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 --field-trial-handle=1812,i,12893371063646941151,15632043352273729008,131072 /prefetch:8
                              2⤵
                                PID:1404
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:1872

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\a94b82231205ffba_0

                                Filesize

                                261B

                                MD5

                                ca3ba985ff6762c3ec28e541d323c5b1

                                SHA1

                                8a1c86c5cdb9d92c9672f6ebab1b217887e52798

                                SHA256

                                c6d9ac29b7520670ed159c17ff192b6468f269acecd2db71ce80315ccda40b2e

                                SHA512

                                3efbd27933922a46d0107224c9aa2cedfd3179ed70d6d5b403f4cccc8a6cb57dba3ecd7b52c1d57890be5858ea47089724489a864e02cb21bfb2667653548aaf

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                552B

                                MD5

                                b436503be2aae22692b5b2fc3463223a

                                SHA1

                                fd344f9d51f81b12b2cb84d9ff2d7e3312b9941e

                                SHA256

                                f40e7b2ed78b16cd437aa87adc54d92820f56b5ca5b75655daffec3bf4782ba8

                                SHA512

                                9d0d3534572ab22fe337efd8dc7755e04c7ecc15717e58dec649b02c1da0dfe4e1fa63b15ba5e9f21bca25abee580eccb327abdbd27634135bf4e48e61e4cbae

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                1KB

                                MD5

                                64ac9745ca169666016a2fde1c60e113

                                SHA1

                                7759405c7276e942f25696e100187616f13937d6

                                SHA256

                                50fba63d4560c1a5ae94f52166760c9eabcdb5d21be1480e56a79d572c7d5407

                                SHA512

                                b4157b92862b43ae542366ba5d321728e554809fa6046ad6b0730fe7c59848c0cce241000e3d91e25b81969f6fd36e28413c76841eec8aa381c29c41a37325a0

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                9ffdd3290fddd436ec6f2ae99d8bdf9c

                                SHA1

                                216efe0f1d21111452ddd1d51fe10f8dca0cd148

                                SHA256

                                d926af1ad84aa927e81330d397c16e4b971610e7ba9ddf36eb632e331edf20e5

                                SHA512

                                39c50c1a0ebda0af5aa9376327a7792fd05029ee8839e47eb26a662d4bb97650c76ce2bb59ba0cc4764227f74d82d14a3568f27025de0444adfbdc3d2397a2ba

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                15KB

                                MD5

                                bb0ba5d71739d70532a393d17ffd54f3

                                SHA1

                                6fa498d1fcf2f3c5080dc3a4cf6bd183db187025

                                SHA256

                                477c96849d4410cb667ffdf2d6519f39c799dbfbd63a6b51633a2d0eba472cf0

                                SHA512

                                946f88b58f37f7437a95570b4036d77af8e1076be1f88143170e57be2836dee403b948cd61ec84422ecaf1198b378f6ade96ba93055844766afd6f950f8fc454

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                145KB

                                MD5

                                9183eefa9fcf9734d9d8f301d0ac03fa

                                SHA1

                                30d2f4986c6a10ef8ce85fe62a5d96e297ef3b09

                                SHA256

                                d19bfa97f6261182e8d50e9dbe9d7a0ecc022bc9df5c4572f10796ba906d9e82

                                SHA512

                                810146599094e9309d039a6d6faba3e14e33d2437c9d3e66dddbf783e5adeffa0fb156a38691f416ab47dad567cfb25199657089003d4a4df99676c0fb253db5

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd