Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2023, 09:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://etyerecentlyhav.info/3302794352656152946
Resource
win10v2004-20230220-en
General
-
Target
https://etyerecentlyhav.info/3302794352656152946
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133290562947119401" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe 3180 chrome.exe 3180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2436 1296 chrome.exe 84 PID 1296 wrote to memory of 2436 1296 chrome.exe 84 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4152 1296 chrome.exe 85 PID 1296 wrote to memory of 4588 1296 chrome.exe 86 PID 1296 wrote to memory of 4588 1296 chrome.exe 86 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87 PID 1296 wrote to memory of 1092 1296 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://etyerecentlyhav.info/33027943526561529461⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6aee9758,0x7fff6aee9768,0x7fff6aee97782⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1844,i,17327442638762109628,6116939471239503229,131072 /prefetch:22⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1844,i,17327442638762109628,6116939471239503229,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1844,i,17327442638762109628,6116939471239503229,131072 /prefetch:82⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1844,i,17327442638762109628,6116939471239503229,131072 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1844,i,17327442638762109628,6116939471239503229,131072 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4716 --field-trial-handle=1844,i,17327442638762109628,6116939471239503229,131072 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1844,i,17327442638762109628,6116939471239503229,131072 /prefetch:82⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 --field-trial-handle=1844,i,17327442638762109628,6116939471239503229,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 --field-trial-handle=1844,i,17327442638762109628,6116939471239503229,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56237394642e14b55b05620603482a66d
SHA1519ec82531d4a516fecbe5ec92b6528ce4312326
SHA25666de8c7571b5ce577cc828ddff5747df4bfd9f6590afd58bb44fe3fe8408f949
SHA512f8080559f3adc4dbadb15fa11ba46e28612bfae4c03631f1368707bbc81776eca5faa9cfc53d06937eb9eadae3ad70a91a7c6c6a471ef1541e2a748c1ec600c3
-
Filesize
6KB
MD5c05c660f769ffcda8092a33ae129d757
SHA1cd30d85a737876c0a32721c698246275499145cf
SHA25601dd37bd272550b60e0225e97a8fdb6ad37a369fc08d387bc9f8619ff3780480
SHA5123d552f8802201144756cb20c5d737b9bb7ac3df006bd91850d106b64fda922b955681c24daf46cd47268b16150d45e9058bda04de3f4fec674c9f38a058910a6
-
Filesize
6KB
MD5bf494757b78b81b31f152f72520affb9
SHA1986e947b9a374dcf53af97ddd0af36a4ebb0d4cd
SHA2562668b57982785844e046108e67e39db94fc4520eb7d8a2143774408d6767a9ca
SHA5124347f5026c043a2b6f550e1ba97aa928f1c79d4a3181025af8fdc877aaa6a4d490de91465f9bdea557467f1ca6b4c23941cfe6b110f920ec26e50682b3a9c175
-
Filesize
15KB
MD5fc4aa65733913fcdc4f87b45b43d3a2e
SHA1c0aac79d68bbbefd396bdcd2a66d210454101da6
SHA256bd68c579c75e16378512e2b54191283eff0adc893542cbe552924fd657347fb7
SHA5125240efa0018bee85c688299262e449e5dc9605f48e84dfcdc2a5860e6ec83f59ceaa5fc33320d8cb28d10f6a79bdf15de7349317209418d8274685b08cd0c782
-
Filesize
151KB
MD58d630e2f26de8c2f9b00a91f1ad56c5c
SHA1312b505e838b1ca058b65494d4eec68dc9037c90
SHA25657962c19ddd5123182b1c484411c6250e15dd96932ac7bf77c40839c83e81cec
SHA51266b18bf3490b948ccca940e9fd6afdbff4fdfac873a3f4bb556c37ccf223a3d544bde1431017803ca3fa4df0e03c277109c586339e6e430de4d2905676e3c743
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd