Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
269s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 08:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://polo.feathr.co/v1/analytics/crumb?flvr=email_link_click&t_id=6356b996c1fccc23a0986068&crv_id=6463f2e263e449c697f8129f&p_id=63f8eb47f677980531c7036d&cpn_id=6351a37c0a37531d83bf8948&rdr=https%3A%2F%2Fmindfulengagement.net%2Fcss%2Fsecure%2Ftamp%2Flitpyk%2F%2F%2F%2FanJhbkBzY2FuZ2wuY29t
Resource
win10v2004-20230220-en
General
-
Target
https://polo.feathr.co/v1/analytics/crumb?flvr=email_link_click&t_id=6356b996c1fccc23a0986068&crv_id=6463f2e263e449c697f8129f&p_id=63f8eb47f677980531c7036d&cpn_id=6351a37c0a37531d83bf8948&rdr=https%3A%2F%2Fmindfulengagement.net%2Fcss%2Fsecure%2Ftamp%2Flitpyk%2F%2F%2F%2FanJhbkBzY2FuZ2wuY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133292255023107285" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 3316 chrome.exe 3316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 512 4460 chrome.exe 85 PID 4460 wrote to memory of 512 4460 chrome.exe 85 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 1016 4460 chrome.exe 86 PID 4460 wrote to memory of 540 4460 chrome.exe 87 PID 4460 wrote to memory of 540 4460 chrome.exe 87 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88 PID 4460 wrote to memory of 1684 4460 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://polo.feathr.co/v1/analytics/crumb?flvr=email_link_click&t_id=6356b996c1fccc23a0986068&crv_id=6463f2e263e449c697f8129f&p_id=63f8eb47f677980531c7036d&cpn_id=6351a37c0a37531d83bf8948&rdr=https%3A%2F%2Fmindfulengagement.net%2Fcss%2Fsecure%2Ftamp%2Flitpyk%2F%2F%2F%2FanJhbkBzY2FuZ2wuY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96ff59758,0x7ff96ff59768,0x7ff96ff597782⤵PID:512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:22⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:82⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:12⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:12⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4908 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:12⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3276 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:82⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 --field-trial-handle=1784,i,15582093732908730456,12332857419164168447,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5766ecec92768c87631c79b1e2cbd08c7
SHA147b5d1756dd1491efcbc49ec00b504bffe7eca54
SHA25603927604d657016509b3ddd7e4bd8b352086959b5fd527db7ca1b7b03948a362
SHA512fc958d35e6fd7a31d1865e74dbc6a43635356e7cb20dceba9452865939fc15d2893e3707d114ecde9aa2c3bb410de11bc4404eed9cde6897d1aa2e3fe2b71ee5
-
Filesize
534B
MD58875e4fc16a1093d287039090fd81915
SHA1249d7bd4f0981988ab5162e09072af1cf6418691
SHA256b5bd811b5bcd915eaa3722a5c6b8817baa070a9332b5a126df202ad58354bc3f
SHA512ba6fb9509825930e1416aa62846a4a436ad41a68bea497fce87d35de6f6d1d219d062d247a9799102415de3e76b4a9d48c252e66e7b4ad981fafd31a22ae4d18
-
Filesize
6KB
MD554f670a3aa333f026ee99775411b2137
SHA1baf160ee452737862cdeabb24781caabc0c7729b
SHA256e9cc53e010639133311eda27cdf417c4e090e885e7e241951bc3c99835052b2b
SHA51282d2bcb5da263af710c54bf0a811d1f0e694d0a50f79d69e8c357d415bc171a37a5686b6a77761e0ae99e404fc6b849ddbeeed7810198a2378d157649a4b1429
-
Filesize
15KB
MD5c604ee7e3e890cd185d9dc793a6fc0fa
SHA151fe18fc902e02e340c7e1710be634481e07811e
SHA2566ca2f9e2f3ffff53c0101e5ad8862c74fa3f33d66b32dd2239301e9c69e15b80
SHA512f68e1a1739a4df7579ae68e731b8ce05dc091438d7b85a9acb0581d07f520dcd84a78b610e24584f3949dd1fa5ff16b859b0e92eabd13eeb287edd7df92e4b99
-
Filesize
151KB
MD55f739dfc0acb2c6c8138c46def8942e1
SHA1b96363a17dd1250f7bf754fb34ab369609aaf289
SHA25617b09af75160ae140b06ffb8887c368b901f1adc042350a06623872f6b4a54df
SHA512ac2c568d14a8fdc70845ea10061fa8f33cfbdba20fa615dacf77ab43a93fce40bba39d658b469be3ddd2e6d9a30c70c91f077f9eee6b33aa172f0baec6c6a367
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd