Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 20:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gtly.to/lRANeCu2I
Resource
win10v2004-20230220-en
General
-
Target
https://gtly.to/lRANeCu2I
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133245966332556625" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3360 3016 chrome.exe 87 PID 3016 wrote to memory of 3360 3016 chrome.exe 87 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 1436 3016 chrome.exe 88 PID 3016 wrote to memory of 4804 3016 chrome.exe 89 PID 3016 wrote to memory of 4804 3016 chrome.exe 89 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90 PID 3016 wrote to memory of 1848 3016 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://gtly.to/lRANeCu2I1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe06c99758,0x7ffe06c99768,0x7ffe06c997782⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1828,i,3264544448138238104,5189217130598845955,131072 /prefetch:22⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1828,i,3264544448138238104,5189217130598845955,131072 /prefetch:82⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 --field-trial-handle=1828,i,3264544448138238104,5189217130598845955,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1828,i,3264544448138238104,5189217130598845955,131072 /prefetch:12⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1828,i,3264544448138238104,5189217130598845955,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3784 --field-trial-handle=1828,i,3264544448138238104,5189217130598845955,131072 /prefetch:12⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1828,i,3264544448138238104,5189217130598845955,131072 /prefetch:82⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD564064c987dc05ce54a28640a891dc0cd
SHA1141748d9a8e9e16eec4a7dfc9d24275e52d35947
SHA256c9b8746fe9d12a0f11444667ed62b06f9b66c5abf2a361ff77fde54cad0e2556
SHA5128e0bf384d47ddb703edf81cb848227faa4b669f257e50f23cd4b6acfd5d550b27a970cbc5b31e2b833ed8c5dc9df5e9a4644738b4606ab4bd183e1381f15cce0
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD50610b6a5afc871b4ffea89f7bafa6306
SHA17505b86ed1ca367f59eab2e5d3873f7f4e53c487
SHA256be2d930acf6bd8bb262f3cdb845ccb2ce957e7e34221321d16843bc2bda0bea3
SHA5120ce66a39ba7a2d0e299a314c6c89791397ec6d0e51bd0b082438440258fca9816794d9edf283c3892cbee55f7bada589feb7f1aa3402b74bb6fac388e4278359
-
Filesize
872B
MD5667e258bd0bb405fb1902b994fd75997
SHA1885f8e8005d0af844e12f3f08a3d18950e9d4fea
SHA25682d2513f919590a85216c6d909a4a9496880ae39057b65d5b6cb23c6308e1b71
SHA51234809ba1c852806e928c244b8657b1a8d7ac2c17f8dc88adcc920ee3432676676e3643c7f20d9686674c2ff9277e68ee370d5f10acf91fa6b67be4cb97e91a87
-
Filesize
6KB
MD5fde42495c9a00063892a7ddd7750272b
SHA1de78cc51fac58e3c6d5ce0d058668f0a218e4af8
SHA256735d0f9571f8f340d6d60b9f1858141886e59b9e3a65ced40ed836271c7fc585
SHA51278c44bbda839db5c30da7ab965256e3901e5c5bbabc6398fc735bdd7affdd3ad917387c8342d489f7174ac41d0f682f5a5f8e8cf2525227b90639e9553a90342
-
Filesize
145KB
MD5dff32b26ad40e7a201e615714afc8406
SHA1be2de315fe7f8cd94cabad9f5ca9baaf2dc1f8c0
SHA256a7895f5cfe17537bc89ba5dfb50d0fc4bb7661ae6ca6d888700926ed9a046923
SHA5126210bcc8a58fb15be676a5e175c4eae350d5c945bdf6d1ff06db1be53475af0f68ff6a6245df262fcd804117902c7bd2137827df895da8453825b82a2cd32d68
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd