Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2023, 09:27
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://invoicemail9202.com/auth/[email protected]
Resource
win7-20230220-en
General
-
Target
https://invoicemail9202.com/auth/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 chrome.exe 2036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe Token: SeShutdownPrivilege 2036 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1072 2036 chrome.exe 28 PID 2036 wrote to memory of 1072 2036 chrome.exe 28 PID 2036 wrote to memory of 1072 2036 chrome.exe 28 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 840 2036 chrome.exe 30 PID 2036 wrote to memory of 1540 2036 chrome.exe 31 PID 2036 wrote to memory of 1540 2036 chrome.exe 31 PID 2036 wrote to memory of 1540 2036 chrome.exe 31 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32 PID 2036 wrote to memory of 396 2036 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://invoicemail9202.com/auth/[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a79758,0x7fef6a79768,0x7fef6a797782⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:22⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1468 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2228 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2212 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3512 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1272 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:22⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4060 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3500 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3592 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1564 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4356 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=836 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2392 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4392 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4000 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4772 --field-trial-handle=1240,i,2295992150791182463,720097235392370492,131072 /prefetch:12⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f45ee86ad0633fde99a5e77266351e66
SHA1f1872bf893514992aa41dbf5a36ad65af3bc56a1
SHA25633dee32782dd6b734d6b3ebde928bf2d14c265e212dbab7adc64db0a4d8307b3
SHA512b2b5e203204f3d3a20203360b4942e41fba4bc9863c01b8c4601e2a894c3eddeb710c869899c0e6ed882e8b8175bc4fd86acc99d1e240770bec97cbce3567b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cafdd1799760c727bc8ff267b3de468
SHA1c2bf79eb088709538ab9e321dfa92a936d804ccc
SHA256c21b18f6a462848612d6457ede9c8b87ae39dbd707ccf16f789b61ab3f75029a
SHA512a2764503fd79b12ed05fabc46b84a2944862ab64edbdada4ca42cedd1884f235039dcbbeb6bab3086327f969349df19387d639f22d141a646040aedab1c2e2b3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6e9bd6ff-a10c-4082-ad42-0c7eb1016644.tmp
Filesize5KB
MD5561243108cbc6af9e7e5693104811d6f
SHA1cd4ba41834d643d3519ac815458016f910bb1545
SHA256a1c9c70ce3a5cbf8b8b1b40b40e2665b652679949d8c95f062c1494896bea934
SHA512a8138a072f4f8cc8e12428f2c20a7c143e11ad29d3a6d6ade98fd53469f5d6e02e80f7661263bae47488ae7d53e7e1995e109603b43bc6a068ed4ce9bb3d54bc
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD54fa6cd33612c220ad20fbeecd414320d
SHA10c0dd937cd022ad2477e21ffdb7291cd532ee1cf
SHA2568fbfcc63aea30849cde6657c9b828b875279c4b269a55df137895d3d3de0dfad
SHA5128245510d8580d9a20fb28bbdfa9f2d003f5b1f4ac5920ce2eb423f8ed1946263ad2bed63e8adab6dc2a3ca773d436a94e242d681e9d988d3a188e3324f337dc9
-
Filesize
4KB
MD59ff632fbb236051d1bc9f4002baefa82
SHA1bd189a1969618a6a78340fe3e1dd4da6cc544ab4
SHA2565dc53d16af5142284d1596ef9c73cf913c9d6e01cf9303ded8f34f5daf6e9602
SHA51288e6f639af7616604a360923bfbaad4f617e309ee51acf21bfad1825029dfcb9ff3f42ec056e4a30ae3a733080ef9d7c84bb03b6b3913c04f4b5444b91a342cb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d