Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
06/07/2023, 07:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3pB8Dac
Resource
win10-20230703-en
General
-
Target
https://bit.ly/3pB8Dac
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133331031934476193" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 8 3156 chrome.exe 69 PID 3156 wrote to memory of 8 3156 chrome.exe 69 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 768 3156 chrome.exe 72 PID 3156 wrote to memory of 1088 3156 chrome.exe 71 PID 3156 wrote to memory of 1088 3156 chrome.exe 71 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73 PID 3156 wrote to memory of 3128 3156 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bit.ly/3pB8Dac1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc036a9758,0x7ffc036a9768,0x7ffc036a97782⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1700 --field-trial-handle=1840,i,12022617099856206520,13267988900047567440,131072 /prefetch:82⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1840,i,12022617099856206520,13267988900047567440,131072 /prefetch:22⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1840,i,12022617099856206520,13267988900047567440,131072 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1840,i,12022617099856206520,13267988900047567440,131072 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1840,i,12022617099856206520,13267988900047567440,131072 /prefetch:12⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4424 --field-trial-handle=1840,i,12022617099856206520,13267988900047567440,131072 /prefetch:12⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1840,i,12022617099856206520,13267988900047567440,131072 /prefetch:82⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1840,i,12022617099856206520,13267988900047567440,131072 /prefetch:82⤵PID:96
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4556 --field-trial-handle=1840,i,12022617099856206520,13267988900047567440,131072 /prefetch:12⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 --field-trial-handle=1840,i,12022617099856206520,13267988900047567440,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d7ed8344fac3d1594caa463b2eb9d2fc
SHA151bda0e723922e35e85547b64f736fd255b9c363
SHA25636493760f99a41f83a2adfbd20cd7084e3797c49179e699f4eb2c2ecffd76220
SHA5121f4293b0972bb7ca5eec5f9856713db394297f3bbf22c0708667dcd57fb21f3c5d00e4023740d67ba88e5c06763d5e10f852e01924ad948690f1d68fa3c3412a
-
Filesize
5KB
MD51e5c3e2a121d8ae3258d260396c9bd13
SHA1e848d45e0f6cd198a889baf3d4cffa9c6e436ea2
SHA256a6b3100b8875f222a876db040748132fff6ca5dd13b2c79981026a52d9f629c9
SHA51223f78507919aba464c5d4eacf468830bc89cc2293103df767a32fd8e26c321607664e244b0e89a41ae7f72240a67629a96a8242c9246a8f978c5915343aaa20d
-
Filesize
6KB
MD5edcbdf9503fbc793a6ea568449b6f5e9
SHA13d92be1564c88f62334a0a9faa8ba91d46ceaab2
SHA2562edbac4220b0bb5c9ab46746e8ae8921354e98037dc0dd47a8288915ee4abbc6
SHA512242ceba1b863bea617e6e107912b370fce7f12a9fcb43395a6bc9071d2759d9f4c384dad5181c60b7964511a613a058ac61c5107afe51146b8fd0f73581a5fa2
-
Filesize
5KB
MD5fef16d01d6a744f47dbc04a81acbffe4
SHA151771b664524d594d8a6984b6c670ab75fe098c1
SHA25689fc2a4a7649d7154a8427d62b211b6b8a0a4dc34f53916bbc9076b76198b17f
SHA512a0cb4146fb3e4621c63b07900c0efcf929cd6471aff53d0245b0cae2439d288f183213ed8feb9689e68791dcceaa9708275d347e2e918c8b3bf2e69c0a16bcca
-
Filesize
171KB
MD5f3002516f66e98addc45d4095d2b6449
SHA138233296437cd6f68da9a9ebcd5d634c75c9f007
SHA256ae6f86869702b4923f71144877664b6a75d336083eb4e3d6f37f4b0965f1a909
SHA5127bcba2fa814201cea2bc19b6e69bddb7a23d8c43b77667490165a261dd1cfa180af5a448cdc3b8e034c6bc6df8faab59e39f7e9a7197bb2a02659c7d7c80eacc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd