Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
106s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05/05/2023, 14:48
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://zwu.lwkk.certifiedsolar.com.au/Z294b3BhdDQ4MEBqb2JicmV0dC5jb20=
Resource
win10-20230220-en
General
-
Target
http://zwu.lwkk.certifiedsolar.com.au/Z294b3BhdDQ4MEBqb2JicmV0dC5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133277788991410265" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3584 wrote to memory of 3520 3584 chrome.exe 66 PID 3584 wrote to memory of 3520 3584 chrome.exe 66 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 4792 3584 chrome.exe 69 PID 3584 wrote to memory of 2904 3584 chrome.exe 68 PID 3584 wrote to memory of 2904 3584 chrome.exe 68 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70 PID 3584 wrote to memory of 4844 3584 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://zwu.lwkk.certifiedsolar.com.au/Z294b3BhdDQ4MEBqb2JicmV0dC5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8154e9758,0x7ff8154e9768,0x7ff8154e97782⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1712 --field-trial-handle=1772,i,16067743479577036268,5297102189540027738,131072 /prefetch:82⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1772,i,16067743479577036268,5297102189540027738,131072 /prefetch:22⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 --field-trial-handle=1772,i,16067743479577036268,5297102189540027738,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2512 --field-trial-handle=1772,i,16067743479577036268,5297102189540027738,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2764 --field-trial-handle=1772,i,16067743479577036268,5297102189540027738,131072 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1772,i,16067743479577036268,5297102189540027738,131072 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1772,i,16067743479577036268,5297102189540027738,131072 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4416 --field-trial-handle=1772,i,16067743479577036268,5297102189540027738,131072 /prefetch:12⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2980 --field-trial-handle=1772,i,16067743479577036268,5297102189540027738,131072 /prefetch:82⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1772,i,16067743479577036268,5297102189540027738,131072 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5114680a1047e4fc013ba116c788073d8
SHA148012fc071a3c5d27ec6467bde8ed2d764f551c7
SHA256d2a883cb264f92bd786667e188d85cd25fa336df147832a68f987a9c5b796155
SHA512e0256b17e741deb091530fcde6f38be84697db5949d867716554dfab7da66e4b06d6065ebb5d26e3a3e41c6ed5423cd8d73e57b5ceda956be75651e71d926953
-
Filesize
1KB
MD5838e3be1584a06939d2fe773d85d8887
SHA1d1cfa400ae5ff9d8048b884f779e4413dcba5af3
SHA25613cdfdbb22839128e4f1e1a902b61c26f955fc8afbf5059073dbc6e62e05022e
SHA5121cdcceffa07adbe6b6fce9b9e537570f1dec874c9e9a0dbd316e62af1a2948ed02ec5e66ff52365a9a7166a6fee0a84d4aad37f760e415a7cb967d33289592aa
-
Filesize
1KB
MD523f9de86560c5f095c08dca0c9d47aa8
SHA1297b73fb8a46f8658338aef783e4a190957029c7
SHA2563a4944c9e03258d7d873111dd2a63b29c80a1ec61b13882661ec6ac8fa284991
SHA512adcbf1d36708e1dcf886bf3671d76a1c93ffe1008cab5d54f1d02585d9e0b8d669c8b7777bc89ca4a183b20bebe3ca846f481c062cd71a7e502fb4ba5f420fcf
-
Filesize
873B
MD5817c10e83aaf0d0e98eb9eaf7b393193
SHA15cd018340efa758eb79b602319d7b4fa0bda321b
SHA2564c9691dc1f83236d75447d5388f2b52c1f660503009e63d4e6a8caa2b0ac4e1d
SHA512b293e62fac363420b922d00e78d263b41ba753632b41f718acc26b04dac2cee9f9e0f36199440f2a3f18555686a27c9997b4b574a06d7b40a431f844c9bd45d5
-
Filesize
5KB
MD5d91427905878a2d3947f4817661cb309
SHA10949e4f8406228c7d6f4e9f8222e0e3ab58e3117
SHA256d3773ae3c6aea55aaec4bd61abec0f7ce089a844703a76f1723c595820b2e061
SHA512954df2b42199e626afc2de1fcbe2a13a57c067db3fe3a1744d32ace637c343b0a391fb6891d2ae05be9de084769db660b6e8232f6083de0d8f549c9bc8ef46a4
-
Filesize
5KB
MD5fc0b03b205687d5e12e522a594003b80
SHA1dc030bcb174b2b676db43109d4058fb778b0583c
SHA2560a06b6bb0a918b3c0bb9775194e1701d8aa34672558d771e031fb8bfef91162e
SHA5129fbc60f5b54317ae6ba7c4f62eb93d325dad0352a1cb256875a0a3e0211144d9dacfde32db3d7bd8e715861433fa8dea222cf9848b42fff60180d8a25f2d16f7
-
Filesize
6KB
MD5e212c734d1242ceec20454a4a74730cb
SHA15d660e8f357890a6023da521c8b3d5322d583483
SHA256ee5776fd675de036acc45328c93f491ffc23e67415da8056fc70fae1692af889
SHA51287e6739840417ca51bf31c54879decd6e12a6c4ef67efb9ec0fd4cb46b5729b924cf09390bdb76813d123e2d24f7b03cc73f265fdbfed4d46b9185873a605f9e
-
Filesize
151KB
MD5ddc91a3737599db49ada6461c2ea5d4a
SHA1663c59a2a6e4512db62092a60b1445c39b23b718
SHA256d140105418f159e62d6df74045087191a5e39f95d0f110db4025fb20b43a76df
SHA5120b40da7d61b1a1c0be4b26f0b04ad33fcb3d6d55e92049a38c241d3060e19cad5c743a4cd72362b4983c14dcdf5b3bf9a7acf1bc0b3eb92a6f35d6d7e89e2e48
-
Filesize
150KB
MD51bc212149933231d3b6669cbacd9f470
SHA1c6a07692876fb9976d245111d328c61db142c386
SHA256c82d665cd6e5198a8e68b7c1c0bd65cc7a3227b78a801498d8690b6bfe64476c
SHA51276ec93fce33e6fd1580579c2ae606b838b76cf0ce604b734d9ab1c5049377b57ca10edc6c582997eba99c031e8a026bf88505872d58ea90e32dff62c47438d82
-
Filesize
150KB
MD544d312def218c1a6018051a68e34e305
SHA1a582df54fd1222e0e87892a9ff1cd1fdd9372c60
SHA25699b46ac1f23e13c64a4dffc16a2212d367fff6b56e932f19f1dd9f7c6df416d7
SHA51241a7d4098a57a0b0e9e73bbf51331cc41589716809b9054381023667f41e59bf5535c1b70b59db83bf39ca42a14ea5d057575daaae2f7a4e5e0fbba878dae16a
-
Filesize
72KB
MD5c1768967319aa16027b9acae8599374d
SHA18f0f7535bc3a3661080fc9ca7b935ffd5365c0b9
SHA2560469f32d18ffed5ab693d3151e768ea07f59728b5fab5d49db6461c35aa6211e
SHA51296906ef0a0c6d8b5fab38f1f53c0c04d5591b6d47a19684c7ca6310f7ae5f34a0d6deb577255661452f84d6c232fb6456664a723c9416d05c4c0ab1206a50e91
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd