Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
27s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/05/2023, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
swifty4.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
swifty4.html
Resource
win10-20230220-en
General
-
Target
swifty4.html
-
Size
660KB
-
MD5
78e0bc0617292d628709b1240f1cd408
-
SHA1
34b2ae137521f6847f21ed99ec51d74b853dcf07
-
SHA256
2f311bc9f66b21432122f61dd2d77054ee2edc143ebde0cf7a83582a878d8274
-
SHA512
11607102932fba43cf9fb159d00bb3dde841c958f4ce6248ae9a450d2bad9916f2ee9462deec3f7c8c3195d353c472c1223771eb1e52cd3234bb88cf6c1f3a5e
-
SSDEEP
3072:FkywvfDcOeyB3aB621wpaY98jaLU+1LoG93fX6rLniEIix/4wwZobAf:m2Vyd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133292596703012715" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1012 wrote to memory of 1008 1012 chrome.exe 66 PID 1012 wrote to memory of 1008 1012 chrome.exe 66 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4648 1012 chrome.exe 69 PID 1012 wrote to memory of 4644 1012 chrome.exe 68 PID 1012 wrote to memory of 4644 1012 chrome.exe 68 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70 PID 1012 wrote to memory of 984 1012 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\swifty4.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffec8c39758,0x7ffec8c39768,0x7ffec8c397782⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1840 --field-trial-handle=1800,i,700895142939253861,10000295949993560606,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1800,i,700895142939253861,10000295949993560606,131072 /prefetch:22⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1984 --field-trial-handle=1800,i,700895142939253861,10000295949993560606,131072 /prefetch:82⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1800,i,700895142939253861,10000295949993560606,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1800,i,700895142939253861,10000295949993560606,131072 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1800,i,700895142939253861,10000295949993560606,131072 /prefetch:82⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1800,i,700895142939253861,10000295949993560606,131072 /prefetch:82⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1800,i,700895142939253861,10000295949993560606,131072 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1800,i,700895142939253861,10000295949993560606,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5949f71444ce89b7c1e75a376c85dd685
SHA1f5a9df725655cd02c86f0c32c0f468a9649762ec
SHA256390f16b01e90f204ba37f2a6f5d7e25b4d0e14838c99f8aeda26f9f63bca2aad
SHA51206a72142d177d416ac7bf9d1049c84e7abf774bff985209c171c104f64a185cb317e36068b5721c5a0cef34ff8e6233d36d5aff06c49f2e56cd6f91a9c6d9d35
-
Filesize
72KB
MD5b7a19bf59aedb4372a76ca0cd2046125
SHA11e0819c7365947f640d36c5e16ccd975d3b897de
SHA2563d998db36711b06a0e362a506c5630cfc223af1410ff4c14c187f8f3ba6174e7
SHA51232f2f139214c248a02091906fd62e463186a820f68d9eb6c1663e08efdd5fc2423b2deea8507017cca532626b5ec8d1cb69fcb543870bf03a610934fb05fdc7e
-
Filesize
153KB
MD55aa8f69dc86853ae42b33a2519e485fd
SHA1ce9c2b76d119f61d9da5a09e395bd66ccb0c540a
SHA256683391567c8efaa3584fc62c88b32a13141b0895db6cbc249eb87680e07bd5c2
SHA5120123c5071ff5fe9d8e8dab9de84dec21ed19b5b4133c9d6d8941c8cbce942aa06097f47e36a689ac939b10c7c2179ba5daf34cf613cf84c50ee522472c53dc09
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd