Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 03:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-au.mimecast.com/s/UzOqCxngLDS1BZwru8pnZm?domain=t.email.currys.co.uk
Resource
win10v2004-20230220-en
General
-
Target
https://protect-au.mimecast.com/s/UzOqCxngLDS1BZwru8pnZm?domain=t.email.currys.co.uk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133304941805812034" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4652 chrome.exe 4652 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe Token: SeShutdownPrivilege 4280 chrome.exe Token: SeCreatePagefilePrivilege 4280 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe 4280 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 5100 4280 chrome.exe 83 PID 4280 wrote to memory of 5100 4280 chrome.exe 83 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1840 4280 chrome.exe 84 PID 4280 wrote to memory of 1336 4280 chrome.exe 85 PID 4280 wrote to memory of 1336 4280 chrome.exe 85 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86 PID 4280 wrote to memory of 3976 4280 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://protect-au.mimecast.com/s/UzOqCxngLDS1BZwru8pnZm?domain=t.email.currys.co.uk1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5aea9758,0x7ffc5aea9768,0x7ffc5aea97782⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:22⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:82⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3236 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:12⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3252 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:82⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5d7ceca850e498a639b0db4fb194c1cf2
SHA1016a38268c25a95695ce63e1bb266af6c50d05b4
SHA25693d937cf035127836337bf460a84207b9b5c7c858a00dfd76c2e6ef07cb9e90f
SHA512b28f7cc579b22393031f8570d83fd643ddbd250a8f7b9fa6c4e55cc437e06ea50fde175cd38894bf07ce9326dda9cff655efc60327c5ce8c4a1f1796cf7193dc
-
Filesize
1KB
MD51e3c956ecd90f28706640c0ba0d28d9f
SHA1a7e0307a564db42b4f16189fb7331787218dff15
SHA256a77ead18742b91e89879fc1fc65829a79f685969ff8f061e10c5f7b98037c169
SHA512891fe71c71e33970407db4df67bbe9af13e735f9ffdf3f3d61dd171ec7e24d1d59664fea222be3d80e9ac11efe128b766e4b17e8e3e30129bac404881812e449
-
Filesize
705B
MD5c318c48c848a44e0d89e9aeec6f1aeba
SHA16ca79ad0468ca048276461a8f4aaabbe94a3f040
SHA256265182c9eebccdddf4af630d54ec90262ccc0951e4c51c9691c83ff1644db6cd
SHA51299e30a40544bac9e9a33a23f1f7bf078afcd7e5a750b036f6d9cb6d64d83e70ccc1441ee46f9ade88a86d163972387d9e1264c80253277305f30621a35b217ff
-
Filesize
6KB
MD5630b01bc61e4ee3bed6769e991294a9f
SHA1b77e7978489fcec8df7141b6ba6cac0643f9f6fa
SHA2565a22c6c4d3bfe10cf4659fac06644d1c28f2f25efc976e77ec45921f5e037a3b
SHA51275f55f809f7ccc6c8b81b75fd5f08be6066c554b3184f662b1f946bafc297d5e7f68a71d88c7f7a977d1e8d079e02a3c768205cca7d3e003240bf16f50a4db39
-
Filesize
5KB
MD57f47e66fe7cb97608e766e9e546fc993
SHA1d2e7a1f4d0350120f9a7916e57e99e1fe69063a1
SHA256089cb151f70f22cffe85285d4fe94345aabeb564e482139f6bcbdf4642719624
SHA512c99163ed4f7781fdeb432666dae931e75584648d33c23d362d0f4596f8211fced49a329779316796f4b94046417c714bffd897167439088688a6b74a3d78349f
-
Filesize
5KB
MD5fb6a286880d158720c8dc5cc3be53dbc
SHA1b0cf6f965512247005132870d7928ab600ec5a89
SHA256ce42325c328f40b45049a0bca8829a37ca36dbb139d871908eb69ef27239f267
SHA512ffa23244dc0733748829d22bedc6279f970e65868127a2e399085a63381d1eba9ff75b7c2abf9334a5f6e0c40796d6ac27434edc31529168145f3d2b977e45ef
-
Filesize
156KB
MD5f33e51f2815839fa2c2f9287e66b8171
SHA1e52fca55340a4cf721fc52f77a47e7753fe6c946
SHA256d796ba913c96f7f989fe7cd34f2ba12f70cf6b07050b615d159c401a2daa3322
SHA5123a64b9bfb41eb69d7d4a1e9b7992b78928b377fcc253ba7830e320ff1b298789f5d890dea627e4057aaa4906303c4cd87e32595503d055fd9601690266c2d29c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd