Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 00:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://wwe-hds-streaming-tv.telechargementgratuit.org
Resource
win10v2004-20230220-en
General
-
Target
http://wwe-hds-streaming-tv.telechargementgratuit.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133264256237016676" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeCreatePagefilePrivilege 2952 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2952 wrote to memory of 1492 2952 chrome.exe 84 PID 2952 wrote to memory of 1492 2952 chrome.exe 84 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 4604 2952 chrome.exe 85 PID 2952 wrote to memory of 2140 2952 chrome.exe 86 PID 2952 wrote to memory of 2140 2952 chrome.exe 86 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87 PID 2952 wrote to memory of 748 2952 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://wwe-hds-streaming-tv.telechargementgratuit.org1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ff85c999758,0x7ff85c999768,0x7ff85c9997782⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:22⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4620 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5008 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:12⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3440 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5696 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=6116 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6252 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:82⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 --field-trial-handle=1816,i,3421097497119187706,7715027179388270240,131072 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD53051a875ac67492c77ccb95e30e0de29
SHA1953941405069b4a23a5095a60f99ea22ee3812fc
SHA256bd69288efb5ce07097483e98de08554159cd7baef5860db679e76e71a9445291
SHA5127ebfff1962ad5c10bc7318326565b94dbfb72a0ceb910ff3278a865ecf1bc54a183a83189cdff89984b6bdb9f8f78d90edc2732b8ca4bfc3521d65fa6977a780
-
Filesize
5KB
MD54665d258ccf8bc023ba24e1dd5033d11
SHA150b1cf9a034fb5a6bbcfea7c8a34c5fa4cea5265
SHA2564d631b13796d6fa268c150833189e0f8b28e424daef1ef9e5dc8a450761e2cf3
SHA512b90d3f2e7879cdaf4d8cfe2f0462118bc1b056a1dabd8e5249691380e657543908a8fe16e7e9b818701ec79576ddb8ac5a00da316bdfce934c31582700c476f2
-
Filesize
6KB
MD522f73a5fde85d34d4d7476cff5fe95d2
SHA1795b977998d5012973f74a8515a0fb35209f4333
SHA2568ae422b436752f298473368925a3c9c7d46b070c8dd29d1db24460d85f4f3304
SHA51215c78c68fd4b0bf08a96975460fbb12bb246361e1a1cb2d6cfdcafe6619861bb0564c82fc23f5756fb23dfc21b6b0a9332bba5654536bf017f99f5b5a5e3cc01
-
Filesize
200KB
MD5bcf07d86d69e4635b2e4cfcedf207eda
SHA1b4d09de7bde35bc7ffa167f9806584092c2a5a15
SHA256c634c75f87f71c815876394da7441ea2c3a48fe0f252810b4d7428ef4aec73ef
SHA51230b424f3b1c7101aee32c25717e48fd79fff81a12f8fa0c2f6dc1b6961a5184beff84e46b06c244bacbd6edc74a0044e9eac7d7392db9741a3d548676ef21cd2
-
Filesize
200KB
MD57479391725e59c3c789d5787e8af8dcd
SHA1647e132f2b906c12f354cdf5ce232c27722d1450
SHA25645eade1838ff11214b0d75784f2a444ad3e38b1b62c53b3cf65b689e9019a96d
SHA512d69bb55b36c460a8ea26a69fe3c765cb76edcc0da5aaf789555c78bfbff084ac82ce625992fec0926e375f630b5794f0ffe9ca48319d80699c9ecfb73f01c0ec
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd