Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 15:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://greatdumps.cc/login.php
Resource
win10v2004-20230703-en
General
-
Target
https://greatdumps.cc/login.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 3556 3880 chrome.exe 80 PID 3880 wrote to memory of 3556 3880 chrome.exe 80 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 4940 3880 chrome.exe 82 PID 3880 wrote to memory of 1364 3880 chrome.exe 83 PID 3880 wrote to memory of 1364 3880 chrome.exe 83 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84 PID 3880 wrote to memory of 4908 3880 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://greatdumps.cc/login.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7db69758,0x7ffa7db69768,0x7ffa7db697782⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:22⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:82⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3340 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:12⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:82⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5264 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3780 --field-trial-handle=1924,i,12118003100280131935,11990627225832303842,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD5109e1c22f0405d01ad585cfd8d858d2c
SHA1bd7a72a1c8cc2c331b3577ddf7aa5248b35638c5
SHA25694e745e4e36f3585fb8ba75b63fd38f774d116c7b78d1748024a722829333167
SHA512a79b4a2b2fbbeb4ba8074a696973b7c6be7e43348094ef374ee7eaa44894f706658ca490487a6f8cece8ab4ef4226194a76b874d548384af8ce0737a6d094fa8
-
Filesize
2KB
MD58d93895570abe2c65257de6bcdd3e209
SHA144454e73176e167885a24f74297b5353e1a52280
SHA2569ecd328f73e184fc8b86e5ee04aef21a996cd9c941bdfbf4433591ca15e5e7cf
SHA512aa3dcfaf3aba249a8238e4ecc9223955038d3e1128f6399b74e6a6f4de9cc5e981b4a5bda5ce337c12ccd074c7a0bca84078282b7d6ce06b7623035b261282bf
-
Filesize
539B
MD5922a16b4bc6c62a233c92db2ebf47f53
SHA17a641a8e0bb08d12053d60e3b457f5cae5f2b4e1
SHA256d6502084668b2f52c47e3bc6435f2949cb4a3d28eef587822c4dad3c60c8cd04
SHA512ad0f62cd48e7225d97249b33b1707edc84106276eba03dd42f2f53aede94ad36561ae25425bce300081de548db06216375a549126159dbb09ee27f0fb4d8b788
-
Filesize
6KB
MD5a78a01012675e2aff072a03aefb8250c
SHA1cd49c27526ff0defe675ef633e808a6f4e73208b
SHA256a8b41108dc77a3eb1370eb30a1ba487e1ebfcc3a52761f3483c0d5a7358e2375
SHA5120089205b08d6ebeaa759e18063d557fd0aa3d076693a8f6d52949deb78523d151591284b600a5a4971526775b26bc9c5282b2c2bb3eacf61f8806bf037a28828
-
Filesize
90KB
MD5efd2ce3d1d788d14259efc7a6f4b9645
SHA1a1b365a10badf64d5a99359bd1c597a085f02349
SHA256d1db1983142a9e5296bb4db93da12f270917e383d41212df4c6cd2b88aec81c3
SHA5120413df279aaa21935c9583273ba3cba4f148cc08ef75ddfddda08eaf5247636345f4a1d36303e28d4167ac97b6841ff896aff8968d5df0e56b44a8ae3eba43de
-
Filesize
89KB
MD516b34a9d1e753975f113d5cff7be742c
SHA1e78f7ff7f9d210a6ac776dc078be2864b1549a69
SHA256c1196853b24632abd9496bc3885438f5ba270e53f9a50df6d92e747f1959dd66
SHA5121d38a2f1b14d64c4317fb0f83638bb36dae0060e91a14cb0c2eb6222f0b3a3302f6c6a51e080781152c74f021f76596ba12a16e7424c68e3efd57b434bc8a675
-
Filesize
89KB
MD537b3e4c8ee156f5aa65904969eb677da
SHA11239d91168db4fd6eb043af166866314a0974b42
SHA256ef25706a8a5a9c52568f9aa8f6d78837998d31624028d3a28d63ecc6d3545e11
SHA5128823044b73032dc5ba4eee22ac997b9f349fc9b9086ebe82e7fdfc46fa817460655209186c8bcfe60c853f5156fc1f12959249997356bde90832b7d6cf9e6cf5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd