Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 19:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u19128288.ct.sendgrid.net/wf/unsubscribe?upn=BrdPAkr9v-2FkFEBvpcWHdehwYhRsDpmJ8DTu0ofJC5ghscfP7QlttWTy1WZ5ILeMv4A3p-2BbNy63rgezOhOmeIZuiYeODS-2BnwHgDWetfBHH2PaTY0E3k-2BR-2B2BR8vbkFYSNIAH16-2F9Y1mzys-2BHMQHMm2T57rFSt3hpvBJqeFQmUKvQYbW-2B5OTHhvJNjrlo4JyXGoOomlHhP-2F8dfHYdkBrt5iq05pRyFZ95TpdnwAXhSQOFyuwbf80tKzystZlYN3AazjAIhl2WSSpKNJrioyGjY99LGAROSNPDBznYqJneQf9pBV0PRzPHSqRuG-2BCJG6gsMrEtfFWQiYSGW6T4Z1WrUTtDsUQpcj5Kzrb5c4pu-2BVTMl4nvSqe8W572tkAu1dTxDXRhdww69lxpYuOGSCeCSpK1I0HQ6sLIbT0uT-2FHB-2FCeEHlPlR2CYF71z4-2FDrahP5Pk4-2FAGtw8Y8GSxTc-2BafbnWw-3D-3D
Resource
win10v2004-20230220-en
General
-
Target
https://u19128288.ct.sendgrid.net/wf/unsubscribe?upn=BrdPAkr9v-2FkFEBvpcWHdehwYhRsDpmJ8DTu0ofJC5ghscfP7QlttWTy1WZ5ILeMv4A3p-2BbNy63rgezOhOmeIZuiYeODS-2BnwHgDWetfBHH2PaTY0E3k-2BR-2B2BR8vbkFYSNIAH16-2F9Y1mzys-2BHMQHMm2T57rFSt3hpvBJqeFQmUKvQYbW-2B5OTHhvJNjrlo4JyXGoOomlHhP-2F8dfHYdkBrt5iq05pRyFZ95TpdnwAXhSQOFyuwbf80tKzystZlYN3AazjAIhl2WSSpKNJrioyGjY99LGAROSNPDBznYqJneQf9pBV0PRzPHSqRuG-2BCJG6gsMrEtfFWQiYSGW6T4Z1WrUTtDsUQpcj5Kzrb5c4pu-2BVTMl4nvSqe8W572tkAu1dTxDXRhdww69lxpYuOGSCeCSpK1I0HQ6sLIbT0uT-2FHB-2FCeEHlPlR2CYF71z4-2FDrahP5Pk4-2FAGtw8Y8GSxTc-2BafbnWw-3D-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133290070326775763" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 5048 5036 chrome.exe 83 PID 5036 wrote to memory of 5048 5036 chrome.exe 83 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4668 5036 chrome.exe 84 PID 5036 wrote to memory of 4528 5036 chrome.exe 85 PID 5036 wrote to memory of 4528 5036 chrome.exe 85 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86 PID 5036 wrote to memory of 3488 5036 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://u19128288.ct.sendgrid.net/wf/unsubscribe?upn=BrdPAkr9v-2FkFEBvpcWHdehwYhRsDpmJ8DTu0ofJC5ghscfP7QlttWTy1WZ5ILeMv4A3p-2BbNy63rgezOhOmeIZuiYeODS-2BnwHgDWetfBHH2PaTY0E3k-2BR-2B2BR8vbkFYSNIAH16-2F9Y1mzys-2BHMQHMm2T57rFSt3hpvBJqeFQmUKvQYbW-2B5OTHhvJNjrlo4JyXGoOomlHhP-2F8dfHYdkBrt5iq05pRyFZ95TpdnwAXhSQOFyuwbf80tKzystZlYN3AazjAIhl2WSSpKNJrioyGjY99LGAROSNPDBznYqJneQf9pBV0PRzPHSqRuG-2BCJG6gsMrEtfFWQiYSGW6T4Z1WrUTtDsUQpcj5Kzrb5c4pu-2BVTMl4nvSqe8W572tkAu1dTxDXRhdww69lxpYuOGSCeCSpK1I0HQ6sLIbT0uT-2FHB-2FCeEHlPlR2CYF71z4-2FDrahP5Pk4-2FAGtw8Y8GSxTc-2BafbnWw-3D-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb96be9758,0x7ffb96be9768,0x7ffb96be97782⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1820,i,14491287017203315803,5610704680725456932,131072 /prefetch:22⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1820,i,14491287017203315803,5610704680725456932,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1820,i,14491287017203315803,5610704680725456932,131072 /prefetch:82⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1820,i,14491287017203315803,5610704680725456932,131072 /prefetch:12⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1820,i,14491287017203315803,5610704680725456932,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1820,i,14491287017203315803,5610704680725456932,131072 /prefetch:82⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5084 --field-trial-handle=1820,i,14491287017203315803,5610704680725456932,131072 /prefetch:82⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1820,i,14491287017203315803,5610704680725456932,131072 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5acbfa4bfb780d363a441f332fc410438
SHA10e7bcd7273172ca546706753eb09be522fd11bb5
SHA25667ebe1cb0a461f45fa8c9b01b05ba3ae320a6c939aa2ed43182c6b9fcba4c0e2
SHA5123c9f126c8baa9e685108aee3d5b3b408885135354d23587be29629ff3f3e1865f9b717a6e8358e6a988edac9cae265a8564fec7f947cef8f3f05ecec3de83936
-
Filesize
15KB
MD51fe72b2f242b490aad6a5370aafa3e5b
SHA19228fe6d1965927548cadaf007d99d7a244db4ca
SHA256737ef198f51cc935d6eb9419b68b0f7bedbdbc6d412f069d3141d0cd058c867a
SHA512adb4957dd36a3b01e4ceb4c74339401e25eee324710d41df46fcfbb5b1bcb59ad939bf1b9aad7ec64efcfd9b59730e139ba7b0e0cc51ef0b916a500924baa7df
-
Filesize
151KB
MD5e31ee0c49188dba67166c419a179e259
SHA1dc25991eedd21a4bc098eb1438adc8cf78022cd1
SHA2566ca25545b93e41d70da2550d1ab5257fec7580ba18b1dd0fc8921024bcc0ea72
SHA51288f201ba431ccd2640511e5e1df596f584dc55e897956ec4c7bc666b9bb91faf60d23e2374ab24b7e2a0595adf0e567a5b0214cb07ba8b69449bf04e99c9d70e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd