Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2023, 14:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://links.makeit.usfoods.com/ctt?m=22036559&r=NDMzMjA5MjAzNTUxS0&b=0&j=MjU2MDA4NDEyNQS2&k=PrivacyPolicy&kx=1&kt=1&kd=https://thelittlebluerocketship.com/p/Diamond-Black/[email protected]
Resource
win10v2004-20230220-en
General
-
Target
http://links.makeit.usfoods.com/ctt?m=22036559&r=NDMzMjA5MjAzNTUxS0&b=0&j=MjU2MDA4NDEyNQS2&k=PrivacyPolicy&kx=1&kt=1&kd=https://thelittlebluerocketship.com/p/Diamond-Black/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133304482248919724" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 228 chrome.exe 228 chrome.exe 984 chrome.exe 984 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 4616 228 chrome.exe 84 PID 228 wrote to memory of 4616 228 chrome.exe 84 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 368 228 chrome.exe 85 PID 228 wrote to memory of 2080 228 chrome.exe 86 PID 228 wrote to memory of 2080 228 chrome.exe 86 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87 PID 228 wrote to memory of 2940 228 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://links.makeit.usfoods.com/ctt?m=22036559&r=NDMzMjA5MjAzNTUxS0&b=0&j=MjU2MDA4NDEyNQS2&k=PrivacyPolicy&kx=1&kt=1&kd=https://thelittlebluerocketship.com/p/Diamond-Black/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff92b009758,0x7ff92b009768,0x7ff92b0097782⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:22⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:12⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4552 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:12⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4936 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3192 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:82⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2796 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2436 --field-trial-handle=1856,i,1003794329495743073,18441865792060030986,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:984
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5e022f193c2df90aea0ccdd190ea02155
SHA114b505903b26e580f601728cbf25fb34ad7ce5b4
SHA256ee8727b3d563fbad71e506fdb0fb55d97cbf9dcc5e8f97e16d4b4af7352d9758
SHA5123abaf3bad92ec97841b40d5779d571f6bba7e7d4172f73625f220e402e44cf3809b1d995153907b4884753908f21a829f0080269ee7d614ffb88a7c37c8d3e6b
-
Filesize
1KB
MD5a1ebfc9dd7140033a4eee426b44a3565
SHA1a9128312c83ebb79dea89c42f6e8ba025799cb32
SHA256905f602ca26fef26cc8ad14c125aaf3a876c88ab43ff3fb76c142e438f44097e
SHA512e67533764905041ee9e52521954aa99940ed4df216406c7deea47555f26a36b2b4ed7fca9b9851b968feb96bc8450d26c7455c7bcf89858418c41c55dfe26fd1
-
Filesize
539B
MD55d1299635480fc3ae18c6268a4e5c603
SHA163152f1e09ca3c92ad2322f94a3298cf6b17ca6c
SHA256d4f6f6536d7ac91239dd5212b6d9bcc30df20d563221dd6d3cea1413c1d472fb
SHA512035ed0425cd9e8ec30705d08680750d33c52c887830c0456253c3d787dcaed148f4dfff5ac84d787d60e47af52d389f39c4f6c58aec8683dcac5f27d2ef66783
-
Filesize
5KB
MD5470c7bb38bf64bee874f7ca88e4f02ac
SHA1969e1e63d492dff0d72bb28fcfaa1716eafba52b
SHA256fef715743dda4aa5c35be78e4262c55a94c23808fe57b57922a8883157e1f3de
SHA51296fbdb8dfbc6372dd45a2c3cbc0564a59c974f0dc6f97cfbc44f1e9edc15c5452c1eaa55ba31c8a87b52b39082694718c357d17d69a06751a17802caa796de7f
-
Filesize
4KB
MD51c905c26251bbf586a2d80e681b76a86
SHA12511e65a19a7943f322d821a3efcb67f38267247
SHA25658ad78ca2822a73d0caf4d09e6cc2030768d9896de28f3e33f9d47e904078d1f
SHA5124cbacc0f81b79906946bd8f2613b87c46fcfab37b45fbb1ee376425acf72a2023d98914f2c12881a63c48b6f08700f7b459517cb7c5928901d16bfaed7c313a9
-
Filesize
5KB
MD59f598bd6b3c83d8f83b42c45d07c800f
SHA106db5c83a6aa3767e12744121fa651b7d8aa6193
SHA2562265960c3dd79d6b4454c6ce42db356d010431b9dcd9116622ebcaa00659ce78
SHA512bd00a03acc1509086f7bc914f0b1dfc8298121a0a4a05c3129da549fec0214f74a1f15aa49bf2837e92fcb31b4d203f6c4bea6261f921f488066ff8421b3e235
-
Filesize
157KB
MD5b6b1edba6d84df0bd8c1beba1c0a30ab
SHA117ba758bcbd49d78c09af17c40690d885c9b8d4a
SHA2569d62658935aba87c36a425d80eb75264fd21f3b9aad898e0ad5ca2cb8f1177b5
SHA5128810ee18aec9c8822897c5cbd4f90d358c3c4beee4e9db01778bc7fec84a5c9fab96a6f5238b3f3ca09edfd9e4dd5c94c16afb3676ba37ba84cc753e13dcbde5
-
Filesize
101KB
MD5414ad5cae28cc192f08f31d18eb46eb4
SHA17be4e67a9dd6ea20f0af3c5a985f766cf7841b0e
SHA256dabd61410191965355f01f4354cd5096c1d9cefb55c4db815d9cf8cfc3648bea
SHA512e3b45961b41c08d7c24b397906e536f045a6263452fbdfb259a60a1e63b1958bc533e354434e15b9b176842f3a24fc91f65a784b218e7a7c6107ac528fb1831e
-
Filesize
100KB
MD5b41a6cca2b17ad005da04bd0c502a1e3
SHA1be7c0481c47ef859870905258769ca8c0c8c8f7f
SHA2561a6d5088d4c10378af639b0b6b09b69c3cea6e5c2bafdb9c8f831bcfa5cf5296
SHA5126927c24aac51c6ad1950e6f5bdb34597ba4354bea2fbfeebb7a111f5ea8c37cd8d2a6cf5b0976d957a91dfdff3bacb3b4de9b7ec075c2e4b08ea0d18cc065371
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84