Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
494s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 11:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tv-license10.s3.us-east-2.amazonaws.com/1licence-payments.html
Resource
win10v2004-20230220-en
General
-
Target
https://tv-license10.s3.us-east-2.amazonaws.com/1licence-payments.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133275864788263843" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4400 chrome.exe 4400 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe Token: SeShutdownPrivilege 4400 chrome.exe Token: SeCreatePagefilePrivilege 4400 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe 4400 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 1500 4400 chrome.exe 84 PID 4400 wrote to memory of 1500 4400 chrome.exe 84 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1788 4400 chrome.exe 85 PID 4400 wrote to memory of 1876 4400 chrome.exe 86 PID 4400 wrote to memory of 1876 4400 chrome.exe 86 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87 PID 4400 wrote to memory of 208 4400 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://tv-license10.s3.us-east-2.amazonaws.com/1licence-payments.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b619758,0x7ffb0b619768,0x7ffb0b6197782⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1812,i,7050435774714408557,4987346719070149170,131072 /prefetch:22⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,7050435774714408557,4987346719070149170,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1812,i,7050435774714408557,4987346719070149170,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3216 --field-trial-handle=1812,i,7050435774714408557,4987346719070149170,131072 /prefetch:12⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3228 --field-trial-handle=1812,i,7050435774714408557,4987346719070149170,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4608 --field-trial-handle=1812,i,7050435774714408557,4987346719070149170,131072 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1812,i,7050435774714408557,4987346719070149170,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1812,i,7050435774714408557,4987346719070149170,131072 /prefetch:82⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3756 --field-trial-handle=1812,i,7050435774714408557,4987346719070149170,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54113ea4d4e55973f78c27bf4da8987c8
SHA1d5efae38225db44c371a24b2885566e2746edd2c
SHA2561fad554125bfe66b8ede142c83f708e70a6c5889a6d81b916e1562ba44019168
SHA512ad9e3357e64f6a536c76b2cbbebf53192c7662568f994e93df8120d9655b2e7b535cab0321e717ddc68564987d10e6a96d57bf3658bd2baaf91f2427d76ce196
-
Filesize
6KB
MD5a09c94b7c52b9c23d92c6db2417ad24b
SHA1366f685d9f160f1c39306a6faaf2ec2c53721a79
SHA256e57ba1bde9ab853bff4eba6d60cb1c09aa772a5cef4da3317c8127f26bea833d
SHA5125e7abe745322414a6742b3292eda42d60e10e3976614971904db36195683d96f002b8813c42c29e4b3a71d0fa3d403cdf22113adefff28d22969c98048137cd1
-
Filesize
6KB
MD55d936738c090bc07c24b462557843f30
SHA153b8702e376a35b27350d845eb9613a557dfd82e
SHA256605af618752eb97815d5d6b1fd139decf88d29cd00c68d71eb74d8a343be4568
SHA512b7e984898ab64e4c956209a6344d16069a11979cb40fa450fbfe23fc0da6f4ee1a565f0b8b3483837a1fee7dd655c10eeba736c254837d44764f83f58748b92c
-
Filesize
6KB
MD59e8c1e5b7ce76247a3ef732814525b95
SHA107168d712692171c139e3a10e66b9aa839da8605
SHA25629e37fc6bae6156333d04fccce6df36c79e881964efedbd10326ff5bae958b57
SHA512ea4a512ae4da21436fd55d0bd5506ced8cf9c0cacd40e62e2e6047b83b22bb5d99e6fbff3a4990740acb2b6341c9e6a1d2e058769f3f7ccf8bf27b9f1bfcd0a8
-
Filesize
147KB
MD5ee11a711fbcaf56204c5c7e126b4740a
SHA1657c34745ca93b7af598eff5c1753a5b2b68a2a4
SHA25699674c165e6f9d328566b4bf80dbd88555cd3dfd1e4b9bae5a83d6a2c8fda9ac
SHA51258ddf37de00c5ae17c84375fad4e8802e7e406b1eb254d4cd0ec6ce202549fa5dafd2a9bd4018ef461116b2ff01a4bee6ec30327c913a8602caf31b6b2fe6d34
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd