Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2023, 07:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.fidelityinvestments.com/open.aspx?ffcb10-fe8c1771726d027e73-fe27157575650675721d77-fe8b1570706c0c787c-ff9e1570-fe1815777d6701757d1378-ffcb10&d=40128&bmt=0
Resource
win10v2004-20230220-en
General
-
Target
https://click.fidelityinvestments.com/open.aspx?ffcb10-fe8c1771726d027e73-fe27157575650675721d77-fe8b1570706c0c787c-ff9e1570-fe1815777d6701757d1378-ffcb10&d=40128&bmt=0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133246410711300017" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 644 chrome.exe 644 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 644 chrome.exe 644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 4672 644 chrome.exe 83 PID 644 wrote to memory of 4672 644 chrome.exe 83 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4736 644 chrome.exe 84 PID 644 wrote to memory of 4820 644 chrome.exe 85 PID 644 wrote to memory of 4820 644 chrome.exe 85 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86 PID 644 wrote to memory of 956 644 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://click.fidelityinvestments.com/open.aspx?ffcb10-fe8c1771726d027e73-fe27157575650675721d77-fe8b1570706c0c787c-ff9e1570-fe1815777d6701757d1378-ffcb10&d=40128&bmt=01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad1eb9758,0x7ffad1eb9768,0x7ffad1eb97782⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1772,i,5541007205021398696,5688694084807620505,131072 /prefetch:22⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1772,i,5541007205021398696,5688694084807620505,131072 /prefetch:82⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1772,i,5541007205021398696,5688694084807620505,131072 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3132 --field-trial-handle=1772,i,5541007205021398696,5688694084807620505,131072 /prefetch:12⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3160 --field-trial-handle=1772,i,5541007205021398696,5688694084807620505,131072 /prefetch:12⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1772,i,5541007205021398696,5688694084807620505,131072 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1772,i,5541007205021398696,5688694084807620505,131072 /prefetch:82⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ea94f91e84a03d912be2c6a1d9db46d9
SHA1b3084710d971dda34872a97e3f277a5af71258cb
SHA25674d0ca73ddd0faf37216fa8cb9220db5d0a8a65c7e1b8df12bb993769b91c724
SHA51285e047f62e855bc0d583170891ad42e74ab3738eec5b9f40b347a39d13df14d6884fc5e8398b2dd48efab7a3fa4e7571a0e9cb4ffe89dcb7c76d612ea4fcf58a
-
Filesize
145KB
MD5fc03633ad83c02a01def12eee98b309b
SHA1f37af5225f93b6e260f2f59c7afa4e8338accf9d
SHA2562d6982ae0746c061f38c76e5282c13bc84e4915a0402bfb192bafba62232af85
SHA5129bddcca54639ac543309977f00f8d354f2f42dc77e0251beb0585c7f16128d675acbf164509fa276a6f4e9fbf8e8918ced52e6ef08ca6139339631af93ff0794