Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
507s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2023, 23:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://links.emails.rightmove.co.uk/ctt?m=24832919&r=MTI3ODcxMzA0MzI0MgS2&b=0&j=MjIxMjA1MzI4MwS2&k=Claim_my_free_appraisal_button_bottom&kx=1&kt=12&kd=https://v954dd.codesandbox.io/[email protected]
Resource
win10v2004-20230220-en
General
-
Target
http://links.emails.rightmove.co.uk/ctt?m=24832919&r=MTI3ODcxMzA0MzI0MgS2&b=0&j=MjIxMjA1MzI4MwS2&k=Claim_my_free_appraisal_button_bottom&kx=1&kt=12&kd=https://v954dd.codesandbox.io/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133291045673346014" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 4728 chrome.exe 4728 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3348 chrome.exe 3348 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe Token: SeShutdownPrivilege 3348 chrome.exe Token: SeCreatePagefilePrivilege 3348 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3348 wrote to memory of 2028 3348 chrome.exe 84 PID 3348 wrote to memory of 2028 3348 chrome.exe 84 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 4668 3348 chrome.exe 85 PID 3348 wrote to memory of 384 3348 chrome.exe 86 PID 3348 wrote to memory of 384 3348 chrome.exe 86 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87 PID 3348 wrote to memory of 4920 3348 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://links.emails.rightmove.co.uk/ctt?m=24832919&r=MTI3ODcxMzA0MzI0MgS2&b=0&j=MjIxMjA1MzI4MwS2&k=Claim_my_free_appraisal_button_bottom&kx=1&kt=12&kd=https://v954dd.codesandbox.io/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed05a9758,0x7ffed05a9768,0x7ffed05a97782⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:22⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:82⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:12⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4748 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:82⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:82⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2816 --field-trial-handle=1836,i,12341675646619002980,16156563994501818481,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD5345d034ca322c0861e728c3a55027a13
SHA19a0897825320cae9f7bec36562cdb0df4ba8d420
SHA256ed7a032f17aee5f6f6cca48c8d0da6ce731e776eb67c9b10c958998d853bc5b6
SHA51225c7a4d7171ef07291e03f793065c22d394243e0c9cf723e7116e31822c20ee66f9be7fcf8e852c8f80bfa01e769465bea9b8d6be669ee549ea8e9d436a164b5
-
Filesize
6KB
MD5403bae43ddd04e5279486fbe60b9d988
SHA16fce227440fba1f50177b89fab5abd688eec0ad3
SHA2566f8d90b31e360aff78f05ed884eef856d15d0a421ffbda077d260347f047d23c
SHA512d5fb287ef5a47ec4257dddc9c203a7f0f7bef9a399cfc2bcad4276a9ddde22ae32b50d1a4c10564b26d0a184b825f570aee367c6aa8a72e5b12ff110301fa823
-
Filesize
15KB
MD562bda37f500b23744e3ff6fda2c254f6
SHA1c9bf2b174509ad51a17059f027fe8a33fa2d1888
SHA25673d9781fde3eba95ad716242e74b2da5ca58daf96844e900caba39b085dc8eb7
SHA512b41c166b0c82680946f30743872a1d81c7a80e0a77ca9879be4a8457f33c4307c8822a80c9a7f4a131b5f7539ce670a257cbf54e64c2d2cb3f7d2e60f4c21392
-
Filesize
72KB
MD5788be6bde1bc227921caefe8e3eb78be
SHA1af4d01a63f221f4c22bf09baa06e3fb1485aa5ba
SHA2562fe66be1e0ad31badc6401536629a65f2bb767a7ac78aaae55d1f93302f56588
SHA512ac747726cad4e2ad1cd77dce521d0c6e0645d586584849eaf9c131f0272e0c7635e3ac94035a0065ccdb08b0a7363a0a35be17da1bf2c9cd15b82c71059fb3d1
-
Filesize
152KB
MD515190a8c48e0ce4443b302c8d3194c91
SHA19c84cc4a6e037a68281fb648ed124f65aba5e827
SHA256724e2529b25aeece9c2cfbce6e102d8f7fb6ac195d1cd81b5df7b226148c7c88
SHA51225fec5ca0b987cf6d4c4c2910f12984204ec753acfb3ab83a8ca9a3726ae5c08ba8e9bea9129968eeb1191725c169195583752d03344f304d3d9bb69d307488f
-
Filesize
153KB
MD57879584247a9162818932edf412361ce
SHA1c9e04bc00a2580cfb0793a7ea93363cc8a3dc2ff
SHA256e252a65c55f781346f2c723448b4d118fb67a03c9420bbe84ee520046c1c3f17
SHA512cf612adf396a9cad4f07be4288eb645aa7da2fea1d88ac00c26c1757c0b3a04762d8f4aea148f84e6a1f1e941e06a3b031bc4ea0a7352ca5de682025339225df
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd