Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 23:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://skmedix.pl/downloads
Resource
win10v2004-20230221-en
General
-
Target
https://skmedix.pl/downloads
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133245260425894835" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1052 1168 chrome.exe 86 PID 1168 wrote to memory of 1052 1168 chrome.exe 86 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 3640 1168 chrome.exe 87 PID 1168 wrote to memory of 2148 1168 chrome.exe 88 PID 1168 wrote to memory of 2148 1168 chrome.exe 88 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89 PID 1168 wrote to memory of 232 1168 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://skmedix.pl/downloads1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff871549758,0x7ff871549768,0x7ff8715497782⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:22⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:82⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3220 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4628 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:12⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5136 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5312 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5320 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:12⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5060 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6088 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 --field-trial-handle=1824,i,12245224250442632620,17789174359542219044,131072 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648B
MD5be07748626f61b1bbd19b7baaf9e0f7b
SHA115213cb2a242702247d3e9215ff82f0e57dfec9c
SHA256ff628cfa3db7f04d39390f285cace2f69f7809d41e50576e9eb534493ffe214d
SHA5124ed9dea516f8dd6d353d37be2db82b9e74d92c716c1ee368ad04628dd1064fc3e0a4dbc6182484f637a00193ecd45803360a9bee5ef0cc62b5f7e12eeb8c435a
-
Filesize
706B
MD571e9b7ce11c0c2249630abd7889c9e67
SHA16415fe531957d6639bfb2ddbf03736bb9124e486
SHA256a4aa23026221dae9bb3955d15e432a419fdc73e32d88b4d83e33c19e3903adc6
SHA512e50bf37927aa7a5a47eec0a599c108418c94335546471f356e51c27b0ba7f60079485d02ae564a314dc8a0452ae8f312fed8d005a73dd3430e961274788b4a7b
-
Filesize
6KB
MD51b6a0f2884ab02860a33f36658c1f796
SHA180330297e50b9e02fead8ecfee84f16687c9b58f
SHA2560a3d81bfe6ed97ea7919a03e81ac055ff37666901bf50775a888261ec787b144
SHA512ef2a51089ed470d42ad8af5b987e6d80d4f858c96298fc1c594fc6186b5cebbc1a6c5bb7c31b1e2a13735ac292037aae22e5ad589c5ffc027f9531bb29e4f6c8
-
Filesize
6KB
MD500a7fc2a137600df882e705d31092c06
SHA105337201ab24f019fecd4c4b40fdb786e7f9cf5a
SHA2569fecbde084b45ac51bb71ef34613353a5b4048ee633888ea1ace982731b1b322
SHA512cc30d18e023b22c81682dfe6a6adc22a5f2f40484b0d59f1a13c4301925b96aac59cd64a8c5be95b2ed501dee8d97d1217980efb1ef147d1533985617456e8ff
-
Filesize
15KB
MD5fa5128203c1869001a6a1f438f172f09
SHA161a56d4f3b905a40724840a30de6a505dfc0b8fe
SHA256850b61d19f016fa1636bb37513beef14a4eb2cb1736a56419d37ef6ca72626a8
SHA5129df6a4265d70f502be6ac4d9de3e0ce5b0505484559361c3fd95183d614cca138bf449b5f83c279e2e21bcaaf4cca0f45478003f395ba1809301c9ccc49f5327
-
Filesize
144KB
MD5037d8357d8b5b45c138f9c4e5a9ecd53
SHA1290d78025e724d3fcabb4e8a9d67b062a12a9482
SHA256c5f197774f1aa8d9b8800cdeb886061a5bb7f6396c563bbe6e85b3b5448f7af1
SHA5124cf216462a5fa709d2444374c24eafcf1973ba22ed131ea13cb3432217d38142fcf4e31d01f9213724b54951bc9e7ffdcb2ccc25525d3c0d629d77f2789a0681
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd