Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2023, 03:02

General

  • Target

    https://protect-au.mimecast.com/s/UzOqCxngLDS1BZwru8pnZm?domain=t.email.currys.co.uk

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://protect-au.mimecast.com/s/UzOqCxngLDS1BZwru8pnZm?domain=t.email.currys.co.uk
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5aea9758,0x7ffc5aea9768,0x7ffc5aea9778
      2⤵
        PID:5100
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:2
        2⤵
          PID:1840
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:8
          2⤵
            PID:1336
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:8
            2⤵
              PID:3976
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3236 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:1
              2⤵
                PID:1408
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3252 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:1
                2⤵
                  PID:4456
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:8
                  2⤵
                    PID:1344
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:8
                    2⤵
                      PID:1948
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 --field-trial-handle=1820,i,6003295656006001945,2907206544258971447,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4652
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:1492

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                      Filesize

                      144B

                      MD5

                      d7ceca850e498a639b0db4fb194c1cf2

                      SHA1

                      016a38268c25a95695ce63e1bb266af6c50d05b4

                      SHA256

                      93d937cf035127836337bf460a84207b9b5c7c858a00dfd76c2e6ef07cb9e90f

                      SHA512

                      b28f7cc579b22393031f8570d83fd643ddbd250a8f7b9fa6c4e55cc437e06ea50fde175cd38894bf07ce9326dda9cff655efc60327c5ce8c4a1f1796cf7193dc

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                      Filesize

                      1KB

                      MD5

                      1e3c956ecd90f28706640c0ba0d28d9f

                      SHA1

                      a7e0307a564db42b4f16189fb7331787218dff15

                      SHA256

                      a77ead18742b91e89879fc1fc65829a79f685969ff8f061e10c5f7b98037c169

                      SHA512

                      891fe71c71e33970407db4df67bbe9af13e735f9ffdf3f3d61dd171ec7e24d1d59664fea222be3d80e9ac11efe128b766e4b17e8e3e30129bac404881812e449

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                      Filesize

                      705B

                      MD5

                      c318c48c848a44e0d89e9aeec6f1aeba

                      SHA1

                      6ca79ad0468ca048276461a8f4aaabbe94a3f040

                      SHA256

                      265182c9eebccdddf4af630d54ec90262ccc0951e4c51c9691c83ff1644db6cd

                      SHA512

                      99e30a40544bac9e9a33a23f1f7bf078afcd7e5a750b036f6d9cb6d64d83e70ccc1441ee46f9ade88a86d163972387d9e1264c80253277305f30621a35b217ff

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      630b01bc61e4ee3bed6769e991294a9f

                      SHA1

                      b77e7978489fcec8df7141b6ba6cac0643f9f6fa

                      SHA256

                      5a22c6c4d3bfe10cf4659fac06644d1c28f2f25efc976e77ec45921f5e037a3b

                      SHA512

                      75f55f809f7ccc6c8b81b75fd5f08be6066c554b3184f662b1f946bafc297d5e7f68a71d88c7f7a977d1e8d079e02a3c768205cca7d3e003240bf16f50a4db39

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      5KB

                      MD5

                      7f47e66fe7cb97608e766e9e546fc993

                      SHA1

                      d2e7a1f4d0350120f9a7916e57e99e1fe69063a1

                      SHA256

                      089cb151f70f22cffe85285d4fe94345aabeb564e482139f6bcbdf4642719624

                      SHA512

                      c99163ed4f7781fdeb432666dae931e75584648d33c23d362d0f4596f8211fced49a329779316796f4b94046417c714bffd897167439088688a6b74a3d78349f

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      5KB

                      MD5

                      fb6a286880d158720c8dc5cc3be53dbc

                      SHA1

                      b0cf6f965512247005132870d7928ab600ec5a89

                      SHA256

                      ce42325c328f40b45049a0bca8829a37ca36dbb139d871908eb69ef27239f267

                      SHA512

                      ffa23244dc0733748829d22bedc6279f970e65868127a2e399085a63381d1eba9ff75b7c2abf9334a5f6e0c40796d6ac27434edc31529168145f3d2b977e45ef

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                      Filesize

                      156KB

                      MD5

                      f33e51f2815839fa2c2f9287e66b8171

                      SHA1

                      e52fca55340a4cf721fc52f77a47e7753fe6c946

                      SHA256

                      d796ba913c96f7f989fe7cd34f2ba12f70cf6b07050b615d159c401a2daa3322

                      SHA512

                      3a64b9bfb41eb69d7d4a1e9b7992b78928b377fcc253ba7830e320ff1b298789f5d890dea627e4057aaa4906303c4cd87e32595503d055fd9601690266c2d29c

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                      Filesize

                      2B

                      MD5

                      99914b932bd37a50b983c5e7c90ae93b

                      SHA1

                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                      SHA256

                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                      SHA512

                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd