Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
39s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07/06/2023, 07:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mkt.symbioxr.com/
Resource
win10-20230220-en
General
-
Target
https://mkt.symbioxr.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133305960317376353" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 3096 2040 chrome.exe 66 PID 2040 wrote to memory of 3096 2040 chrome.exe 66 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 4084 2040 chrome.exe 68 PID 2040 wrote to memory of 2952 2040 chrome.exe 69 PID 2040 wrote to memory of 2952 2040 chrome.exe 69 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70 PID 2040 wrote to memory of 3672 2040 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://mkt.symbioxr.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8849a9758,0x7ff8849a9768,0x7ff8849a97782⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1732,i,16859651255757479713,5562859871798204629,131072 /prefetch:22⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=1732,i,16859651255757479713,5562859871798204629,131072 /prefetch:82⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1988 --field-trial-handle=1732,i,16859651255757479713,5562859871798204629,131072 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1732,i,16859651255757479713,5562859871798204629,131072 /prefetch:12⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1732,i,16859651255757479713,5562859871798204629,131072 /prefetch:12⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1732,i,16859651255757479713,5562859871798204629,131072 /prefetch:82⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1732,i,16859651255757479713,5562859871798204629,131072 /prefetch:82⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD551546f76534ef0761f5eef28cbf11806
SHA114f17393e5f293d92dab43fd7c5bf4e63fa26e5a
SHA2563730572d09b6322e02bc3472546f405aa6fbfa25a0ecdfa89afb94bf6650807b
SHA512ae3293c9c3cc1ff3b78809b21d3a87a4e0bf05744500b727827d4e008ef84770b564900369c2fc7763c5003ce7a2ce68b9fc5daccdbe433d08e824db13c23a8d
-
Filesize
1KB
MD55b26680638d781bf90a9c6a3d494c99a
SHA161b1e67324d03eb6bacfe619faeb15d0e28278c9
SHA256ce538efaa60fc371caf500cd0a23d7203978958b4f34f113e37ae6f4150705b0
SHA512d84c6f3c5db343effcc5061ab684604c45140f5c54170749213256edc670548748a3ed26237a0a37455ffcfb207c731aa6feba6390b274d48fcb750a18833484
-
Filesize
5KB
MD5a21ec02e8a2baeeb374ca112c6a77163
SHA17305fafd6b00402f71a5e023696e17937974b9b4
SHA2565a8510e6c9a13b854fc159568dd2fbedc6285e4908bce07adffe06273a1968b8
SHA512f9a4d2c6bb04cba71d6589edef247f77e4903040556beac71149ba8cb2653f4fa565b417fe40ac6aa6a7c8f0682421a7d141b4f0723dbb96e21b55cb9a7255f0
-
Filesize
158KB
MD5bf0c2a18bb37a052924a52bf4cab63b1
SHA1ef37573b57e79f2a93db46be58e719ec15b0dc1a
SHA256e1671d4604ba007bb90535dd9d89fa01ff793e2722d158968fdcd1c6f443fc5a
SHA51247567a8f069ec24db027ffca7f53761a22f11876bf354015f215066d5aaadba4d50d59fffbdb173e7595a24e295da86a556901032ee17f1f23283e8267df0d79
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd