Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 23:05
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://zwp.lafilgroup.com/expresspros.com/YW1hbmRhLmFsYnJpZ2h0QGV4cHJlc3Nwcm9zLmNvbQ==
Resource
win10v2004-20230220-en
General
-
Target
http://zwp.lafilgroup.com/expresspros.com/YW1hbmRhLmFsYnJpZ2h0QGV4cHJlc3Nwcm9zLmNvbQ==
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133264263566741766" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4136 chrome.exe 4136 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe Token: SeShutdownPrivilege 4136 chrome.exe Token: SeCreatePagefilePrivilege 4136 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe 4136 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4136 wrote to memory of 2160 4136 chrome.exe 84 PID 4136 wrote to memory of 2160 4136 chrome.exe 84 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 3328 4136 chrome.exe 85 PID 4136 wrote to memory of 1504 4136 chrome.exe 86 PID 4136 wrote to memory of 1504 4136 chrome.exe 86 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87 PID 4136 wrote to memory of 1276 4136 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://zwp.lafilgroup.com/expresspros.com/YW1hbmRhLmFsYnJpZ2h0QGV4cHJlc3Nwcm9zLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb3919758,0x7ffcb3919768,0x7ffcb39197782⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:22⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:82⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:12⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:12⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4496 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:12⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4956 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:82⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5004 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:12⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5192 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 --field-trial-handle=1816,i,2641328433751387555,14271668011752849962,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD51fad14a484c701813990fd56a205fd27
SHA1ff32392518b272fc87f339fc841f63f1e695fbed
SHA256a8f97a710daf42bf6711ddc0fbca3abeb014aca2f9e085dd8da7d54c933ad5b3
SHA51229d2b679df5ace07ed5c444f16d287b16410475ac4939354fa8f648b57bbe5eafdf618b6a20c603615265304c414a81992d38cbfd95d413d3cde930138d97dc9
-
Filesize
1KB
MD5a9214c8413d3c006bc732e75ec9a1937
SHA1b57c9ec4aa8954e5f751f0ade6117af7148ba2cd
SHA256667a121a9024082ad48da07431d4740abd7269bb6472c156e2cb843ff6d02497
SHA512cadf67d84a7f87a5b2aea3b0ebfb79195a4c6a66a8b75c233a197d170d6b3d4adf69314c57145180475af81c1822e8ad5795d7c71a95453f21b821e27145f25e
-
Filesize
539B
MD521271e0481d576d68f158add749cfc58
SHA18e3dfc8b1e41b3976ac306273176c3fe776a0b29
SHA25661514c6a439c5feab0195a00cd72da3c930f5a68b7619a5cfa1519f433b644ef
SHA512769841af82d3ce8e05dc99b0e3577c39ccc3ad67d0e99bbed55f8163cf881a04e9b39d48621146797205ac289ba949ccf2d558d640771e5a6a8dd4c8f1c90d97
-
Filesize
6KB
MD5144a1831225dab631202c9155e6a9f23
SHA17a68976dd1c891ae3a7c15b47b5f0b3961938f48
SHA2560b5d3b0018cc99b18e8f0eeb1254b9a7864cf7b43deb9e6c8658496e122ffad1
SHA512e93903a0e3b767b5785cb9e81fee2dae45878afc7d86cf6b6d09d76d22aeefad4172d30b119232e33725d0fc032c91ad66344672d672d84372b02d2ef89ec39c
-
Filesize
15KB
MD5375a92bb4c8cf3b32db14107d24b2425
SHA11a1e56af3a1677673f35a923d610c34fa30ba9f4
SHA25626f321be5139184a4243b3bab14de9a109d8316daf7ccc52a51bed202286f57a
SHA5122001d890b610d4edf66945c36664bf0e74bb4d587fbc3b43fdb0ca7016cd5b974114c35f1c699987820de981f8b1e1d35f53128c2fdf7423bb2c1d02f0b5d9ea
-
Filesize
200KB
MD55cbd659b6600d435f02184f380c6d085
SHA11189824f91a478b3bc189dd8b5815e73f08a4945
SHA2567cf0f53cf5d819da793c55e721afca43826a99cc81cc527c2b9c23eebeb31749
SHA512b5a7e5ed82f42ae156531b95799db3a25d377febc9538d4322a29ef117431f35f1635a7754fb4a0c506e76e8d79f77b334f7cceac173d5449c466104c7862eda
-
Filesize
200KB
MD5c0e444d6756d180508a1b7611921954a
SHA10607c77e257c731201e0d2dd1ecad1c08867d6c3
SHA2560d661598d76b15e4e657534c854721655eda7e763a8091931ee863c7ebb15afe
SHA51293d1169cc4b9cdbab44e6e8994c9682a00cd99e5fb1afccfd65a42e15df4422d9c723c3f698f27580e8bdae1c94970ebe4ad973e5fc1bdba3fdef54936a0f43f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd