Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 20:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://amcorp.freshmarketer.com/mas/api/v1/subscription-preferences?fm_digest=A4B645782813A7003C0DED26F5B1FCAF5C7D36785266834FB0BFEB284EACC3F219578C836B5D4701EC1ABB96137026164298535029A40B4800BE24996134E8278008F10697067F56A77BCEC55DA9C2908D99C648E36BC53BFFB27F7ECA7F185AEDF350253D804139C95E40667F2EF065
Resource
win10v2004-20230220-en
General
-
Target
https://amcorp.freshmarketer.com/mas/api/v1/subscription-preferences?fm_digest=A4B645782813A7003C0DED26F5B1FCAF5C7D36785266834FB0BFEB284EACC3F219578C836B5D4701EC1ABB96137026164298535029A40B4800BE24996134E8278008F10697067F56A77BCEC55DA9C2908D99C648E36BC53BFFB27F7ECA7F185AEDF350253D804139C95E40667F2EF065
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133265903179115220" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 3932 chrome.exe 3932 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1748 1744 chrome.exe 86 PID 1744 wrote to memory of 1748 1744 chrome.exe 86 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 312 1744 chrome.exe 87 PID 1744 wrote to memory of 4348 1744 chrome.exe 88 PID 1744 wrote to memory of 4348 1744 chrome.exe 88 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89 PID 1744 wrote to memory of 4748 1744 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://amcorp.freshmarketer.com/mas/api/v1/subscription-preferences?fm_digest=A4B645782813A7003C0DED26F5B1FCAF5C7D36785266834FB0BFEB284EACC3F219578C836B5D4701EC1ABB96137026164298535029A40B4800BE24996134E8278008F10697067F56A77BCEC55DA9C2908D99C648E36BC53BFFB27F7ECA7F185AEDF350253D804139C95E40667F2EF0651⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7fff4adf9758,0x7fff4adf9768,0x7fff4adf97782⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:22⤵PID:312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:82⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3256 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3236 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5020 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:82⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:82⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4024 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4040 --field-trial-handle=1840,i,6980165861729308772,623829063204893521,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e5c640bdef517f6b852c474fd0821219
SHA1c3589a13104ad2ac50253292e29758958c2ded6a
SHA256b73a1bf6c16bf8b72a8b90d47f9e0a98eef3269f8cbc5bc9d15119e407fbc471
SHA5124879d185e6cb21208d109619b40f4558965bae626b9198d03757f243868ee9b423af419ede08e98d49e2b839e68a3ab2bd8fefced02321b0024b948c1099c1ff
-
Filesize
538B
MD52e4e127ef89bb12bfc64e964f8fcf5b0
SHA1716c1be5fd6ff690d32bb2812f1048cea8658172
SHA2564361f352b78a56e1b03487b819176b84060f5c74a8831cb81a40e5c7d7501f78
SHA512bd679f3569caaa2f1ae3b64a6abdade8a9dbfd50d5791dafaa6f0c3cba3d2c3ec6ef131853287f30ccc070a8c2c008a7f6537116451dc4a2ff3527a2eff731b8
-
Filesize
6KB
MD58a704a8e6024063085d5623e77ef872a
SHA140a438c8e2d6d947647d22d806a37ab86e55ae91
SHA2560c5049000fb5218b7e16b4a54399aa477d710a8afc531be067838c1bc329555a
SHA5121f7d3d0d51ce6357030c017ecce834acf7bc7cb3b5634ff731f1acf243007519dbdcd0d9626ce18771df7fa9894c25c5de24c38b8b0d6e0f1edad03bd6561b6f
-
Filesize
15KB
MD59a195cc10ecf5f3eff0a41e02fbed2c9
SHA1831e47acc54aa844e976ea52caa42cd0a17c8427
SHA256fd622bdc7f061f1a25b2d18fd9193d02eba8383657780e5e5b0a194995aacd5b
SHA5123cd2919c12849b6553b9ec684631cd026c8ab579d1dfb81aa82d4de0b1c8007440f6f091755e09f08b8a9922d7284fd4e4caf2eef692452aa4c61e62f88c8ed1
-
Filesize
202KB
MD59c0752f2842ff2abf62d5156b4745bec
SHA14f21a763580096fdb3d2fe05caf0df05ee1909f0
SHA256640bf7de70450d270f25cffab08519227a854741718079042ab9acd3318e6ddf
SHA51263b0aea7043da85ed84e152cd9acc631757f5908b28120dbec4eda80ebdf82bd4eca1d596ada04982ebdd8d647ca264f0ccc68dd6ee07a8debf7479dcdc8921f
-
Filesize
72KB
MD538c358bb6418e20b9af558cff9931907
SHA1536633483e488f48221b151adb00b5ba9df64618
SHA2567ac2c1e1ce7f772c65aec14e6d10a8a6174af40198a88a748376b3e60a53c188
SHA512953638d80d0f782bf7eb026fbf7b0563f3c8ebaea333ee04777d54c512abfe11d53882787dbe0c755c800b5691767ec7c01e2ab0db1169ffc149d0d30b3896fb
-
Filesize
202KB
MD5293143a8e7f9504a094437103c54fde0
SHA1f7b56f71748d08598933e035a1309e8c50f65e3b
SHA25611ad3ae8f10f412a96e263d4ac56ae88f61902b633a32390ac19ee8847b64f51
SHA512b9fac41f2d77a8f57c0e79bd1ae5d21c2cca34192d5d11b0f40d1747cd8ebdf5fd284dc60e80e45fd35c3163690119d44f2020a56335d72494efd70bca46f626
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd