Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2023, 04:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ww25.4satruck.org/?subid1=20230326-0149-49d3-b18d-2efe79cc43a7
Resource
win10v2004-20230220-en
General
-
Target
http://ww25.4satruck.org/?subid1=20230326-0149-49d3-b18d-2efe79cc43a7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133246323737961528" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4016 chrome.exe 4016 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4220 4016 chrome.exe 84 PID 4016 wrote to memory of 4220 4016 chrome.exe 84 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 3832 4016 chrome.exe 85 PID 4016 wrote to memory of 1504 4016 chrome.exe 86 PID 4016 wrote to memory of 1504 4016 chrome.exe 86 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87 PID 4016 wrote to memory of 3944 4016 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://ww25.4satruck.org/?subid1=20230326-0149-49d3-b18d-2efe79cc43a71⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb73539758,0x7ffb73539768,0x7ffb735397782⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1816,i,2043327179489726151,3691936697117030456,131072 /prefetch:22⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,2043327179489726151,3691936697117030456,131072 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1816,i,2043327179489726151,3691936697117030456,131072 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3108 --field-trial-handle=1816,i,2043327179489726151,3691936697117030456,131072 /prefetch:12⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1816,i,2043327179489726151,3691936697117030456,131072 /prefetch:12⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4560 --field-trial-handle=1816,i,2043327179489726151,3691936697117030456,131072 /prefetch:12⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4980 --field-trial-handle=1816,i,2043327179489726151,3691936697117030456,131072 /prefetch:82⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=1816,i,2043327179489726151,3691936697117030456,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1816,i,2043327179489726151,3691936697117030456,131072 /prefetch:82⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3888
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD537a2935b64ea14a564b1ae73254fc759
SHA1b72c5a907ad4d713d2fc32ad243c5a554c96b086
SHA25699486c93e303dd5809b2327ff2b46e4319ea6305e5693f044c17e6942a6224c2
SHA512fbec87f2bb7b013e6b518dd8f0f524bbddca380b49ee7f6e83e36123eb3f84901c0e1ae0c5b20defc2c16e9b086728cf5beb208fa908cf4bf602d9fc61890322
-
Filesize
539B
MD53eadeb67d9ecfc4a71b6b1d2e4394481
SHA1ee4ab061dec1a1e2bb069a35361c59f977c506bb
SHA25671f81239a9c8f3107832a7c38a7261643153da37507a62cd970edd6fd1b1bbc1
SHA512804461bfed306056fd0224a498164307a5bedee6acd5789a7d7b6138a13927336682273b2740fec9df71661690408f62ab345379842da97aa6b94fd0daaaa5de
-
Filesize
6KB
MD56044ead290c3543ebce5b5768619faf9
SHA1c6d5dee1bda442a33abbc9646861b9a5d92c527f
SHA2566785ccb4628c7d3a744de4f34016e1ce49b537746ccdcf84e001ee9bd1cabbad
SHA51274156f5bb1589fe300a1f46adc6d27c9d77e5b0d6bb8285012484e8135161741177f1eb9d4e970a240e7c949718d00be925419d2beec80f73736caa73fc48bf1
-
Filesize
15KB
MD5eefdd909524637f7971b90b85a273921
SHA1343b55d5918980e9557800184eb35ac55c9210f0
SHA25690581da709909cbd2f9bae875ee7ea46e6c899b6ebe8d80f209d07f6a8458610
SHA512d310e004118823fac0dfb766e9283ca383e3441b6bf42b677ee48205544340c7d9a31177ad4321867c919ac094ec34ca2404cbcb22b7e7d52bf3800b0793754c
-
Filesize
145KB
MD53a82853a0936c0d058a71dfb644cf4ca
SHA132134b3a13a4fe8deb6ebfd4496a1f026bdb532e
SHA2565a40e6371dbc84cec0b1be118c2d799360b923bb70867f8b109d85186cb3e1d0
SHA512d1cd4f1ac8b2e0030c58dc3486e1c63c1dd2bcf596572b752a018f5beece7a4c28a4026eff74ed0ef394a2b27b52913f59756fabebe82e22c13e128d740e13da
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd