Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/04/2023, 05:49
Static task
static1
URLScan task
urlscan1
General
-
Target
https://[email protected]/9bFp2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133265369828737134" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 1952 chrome.exe 1952 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4100 4124 chrome.exe 66 PID 4124 wrote to memory of 4100 4124 chrome.exe 66 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 2116 4124 chrome.exe 68 PID 4124 wrote to memory of 3112 4124 chrome.exe 69 PID 4124 wrote to memory of 3112 4124 chrome.exe 69 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70 PID 4124 wrote to memory of 4292 4124 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://[email protected]/9bFp21⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0x44,0xd8,0x7fff5a0c9758,0x7fff5a0c9768,0x7fff5a0c97782⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:22⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:82⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:12⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4960 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:82⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:82⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5252 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2668 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4568 --field-trial-handle=1744,i,15999504895651680797,6207331450739540953,131072 /prefetch:12⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD59133bd1ae2f99a66449f1bd83bea7247
SHA101c5d6c18fa07e89830b6726262d4dd65edfc3f5
SHA25670130d62998fb1b2edadbc1d6a58c1123dd4f829db3b52c80b974f4d773df4ad
SHA512b47d473212bc029ead09bf7165b0d2482d5d4014495ed977281869ccdce3a5dcc3e202c8235916c69ccfa2cd69f0ef5ab9795e6b90f0b98bdea160ad28b38dc8
-
Filesize
1KB
MD55055a0b4e4f2aa4954143d298f07c218
SHA17f0d4b6afd533507b7dfb6e6d97e1c68586e438f
SHA2561192e86ac63de669570868c33686641d792d95dd3dcbd9e80f76e53e5e051944
SHA5128e14ddc61d2133337de9e3d58b6b4b93447f71c5e1b67eb9863cb9dc232828f5c338ea3a5224e9a95e27b716c6b021dd67f49c0e101fde2e8a8dd3e29a2064d7
-
Filesize
537B
MD544999a1007ae2872b48446f276a190e4
SHA17b23944cf3bddbfa983829ad2aa8bc422b1a7260
SHA256b7391a6bf3dfd2045c6ab881b564f90cc95e683e0fd69c4e6df552dbcf6fc266
SHA5121f5886046e0a493d1bc6d7dbc610c6522be3aed4379a4b5fe592778dde6b8c2df4c9ad634b721dd9534b07400e072dd31ed54a2d8b6260e91c370c8f98835429
-
Filesize
5KB
MD550e89d1e87b082beadcf8a42e248b1c6
SHA1350315a377ac59d86519d63c1652fa67fa998cb6
SHA2563708ccdc7db94a9f09c74301bfc8c684ba501c2c4b9ddb81f1ae919d9a07dd89
SHA51207b3da6c3ff1d6f18c2ed51099e30a0200576fa220a49f316757aaafc4a1d492531b72db953d4ba8b08bb2677cd0f7dc7ab852dc855a984b0a83de04b0b1607e
-
Filesize
5KB
MD5b17fdeb1dbb1fe9fa91c717a96679c2e
SHA1f859bf8772be7bed558052d26798b34f8c1ac0c2
SHA256cd812abbd7ad6ac0689b77ed0c5bd5c60561dc4891e452712fc1112d3712e614
SHA51215364649d33077eca36cf2322a456c6dac4bbb31d7bb0eb0163baab9bb68d95a5154f7a7bdce62667fe91b163d8416c0cc78b041e4eacd075b6dff01c785bfce
-
Filesize
6KB
MD52ce985cb1e67da3b76e77bec42d3a65a
SHA15988d9a514d46006cb8f9652df7e423d08f235de
SHA256fd5881169ded173ebb967f22d2b8428f768dc5679f7a4ef052aad3745db3e370
SHA5120df71085731a7f1ae7e08e93c47eb3fc3bd0a805fd6158c263addaabbe77a133c11d12545263a3e494aba882c27d106eca5df60fc4a2d28af6fd30c58d263c4a
-
Filesize
12KB
MD5df0eee6a906ebe734583a9545aeb1ca4
SHA16af267a0bcd13ace25bbeda8ec013eb6f835e7c6
SHA2565120ddd74cbbe3ad9c29c3d47e67fde63e1458e5c7287eb243ed5173f85399f4
SHA512c423d7c166749009b18631049bb376afcf0567927657e75a86b4d2dcf49e7a40a7b6004843e5a0416b1892b3af600c776210346d8af9c6d58197611159811991
-
Filesize
201KB
MD5235048889b74244e3a41ef207a33c891
SHA1a26d8240fbc4accea64493e3c83358ddbda52b6b
SHA256ffb883106a27747e83ee0853064cf48ae34d8f0e4d44ecc2b2db661676e1e487
SHA512ec9931111cf4c85d5968f0416b9fbff90cd8fb0b7d50075609595d9fa2cde6e7a0d60772f2a75da7cc4cbf8c84b3d989d9d6f8c0d7cb6ebbf3764ea96f670ccf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd