Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 01:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://puutarha.net/scripts/lk2.asp?ulos=https://valetify.tech/meeting?q=redacted_email
Resource
win10v2004-20230221-en
General
-
Target
https://puutarha.net/scripts/lk2.asp?ulos=https://valetify.tech/meeting?q=redacted_email
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133258291418499258" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 3712 chrome.exe 3712 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 620 1384 chrome.exe 84 PID 1384 wrote to memory of 620 1384 chrome.exe 84 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 3236 1384 chrome.exe 85 PID 1384 wrote to memory of 4284 1384 chrome.exe 86 PID 1384 wrote to memory of 4284 1384 chrome.exe 86 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87 PID 1384 wrote to memory of 2880 1384 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://puutarha.net/scripts/lk2.asp?ulos=https://valetify.tech/meeting?q=redacted_email1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffde6489758,0x7ffde6489768,0x7ffde64897782⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:22⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:82⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4672 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4900 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4488 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:12⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3312 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5564 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:82⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:82⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4620 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1788 --field-trial-handle=1820,i,12076151183741836881,10552527897634593949,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD501add44d3040b0ce6003273b0a05d0b3
SHA1fa84adfc779a1308c716b2f9fbf3b7c4f671eadb
SHA256484c41a6189869135c84fd367b620d910bd55c8142e4643093f95202a54b4d90
SHA512f753ecb39ca3c316d43bdaa12d32655dfb4374965f4518b01bbd25b35fd703dd8bea122d3f0bc80a69d2fb317dcc4b403703d3b78975b4b10eaaa52b87f670cd
-
Filesize
1KB
MD57edee08c48294b67dd8c0a1654c1bc01
SHA19b6cc28886d53ea1009a8a53dbbb5ca29c03f317
SHA2565ed073cdb74f0fb15310340700ed2931c7b415aeae65955372430d75a75ad0cb
SHA512facc3a6b1b80d8348a913197713138ce2910ba281b2669451d05cdb1406f88ae0c2e09038815482da8df6e082cf0f4e4daf9d2c168e42e978c85254662aa6615
-
Filesize
6KB
MD5f42e94b44e008020944d2178141c9333
SHA17bc2dc20854259f89f26b1ec7754a13796da0f36
SHA256230a48fc0bb8db08dcf653578dbf288f4b74b3a1deab55c10cb57bd1576f49d7
SHA5126baf64e516f4bf592ba6529c43ec05e184d573b16c19cdfce7c4ec2a3397ab6eb0a3ff0f90dc7896e2a209996559502f36c27abf24b7c2c6b91ca03c1b91acdc
-
Filesize
15KB
MD52e93aba2ace00c1fa4f65d0049526a06
SHA111a53d4f2210eb518ac657897a880500b4dcaf50
SHA256346ddb03b15b83d752324aaede2285ecdaaa4f3c2ff012f9a332b06053c96a61
SHA5129248222f5c2472ffab74d2cb09b91a7fe881a7f7dc7b4d762aeacc7450f9298552a627b3939fd4163a05d3c1becaf0aa0c8972d14d1aee645a7dc31b484a81c2
-
Filesize
199KB
MD5007838a4171953fa36868614dd2b4380
SHA14333be7fb5ec0509dd1fe89fac17cde2a0aa3f0d
SHA256bca81c2ebca250a4b69b7d65d957a1cf0fbf43b24b3b732b5a399fba90856c2b
SHA512088fdc1012a80f771f5fe31e401a7940001a0c44d324f6c42f8ea42d609353f4d71ccc4defeb6f481d228a1ce6efa9e40e90bdf1718245d4f2a0bdbb44b43154
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd