Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
253s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
08/07/2023, 05:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://applink.2book.com/ls/click?upn=yGstQWIQMTt3852mGEUneqtSbHkUk4x0f-2FX1O-2F6S0v7s-2BwMjAcFMnLYiyj-2Bz6nY4-FnV_pGxwouzDgm5QiDoADxfTOTdcyaABbCnLBDalS7SnH9buzj08j-2FxerB5732Uh3b3IlFOgt-2FPrlAiOU0U15PKmPXcvjwU0PRoJxyFuoa-2FBKclDp-2BEPG5punL5xjVzdFHzmsnD1moI-2F3F3RhuWVijFMuoI2HXnAJWh9-2BnDdaPaMdwrpERLqBxTpRxshEqWJ4IZGmpzNnvMMHhWWbt-2Fv5DM07KnZCMyQjQQhzU-2FRzY7btAcqDFyaXYxaFRV9dubLUigS9ymV-2BVlVoNWJVjel8KNloqEW2Q84bJzQW7dG-2FV-2FbxJrDME5Tny0bnJXc4nDlkLYAhh9b3WTk-2Bw5uMcAfYLj9gw-3D-3D
Resource
win10-20230703-en
General
-
Target
http://applink.2book.com/ls/click?upn=yGstQWIQMTt3852mGEUneqtSbHkUk4x0f-2FX1O-2F6S0v7s-2BwMjAcFMnLYiyj-2Bz6nY4-FnV_pGxwouzDgm5QiDoADxfTOTdcyaABbCnLBDalS7SnH9buzj08j-2FxerB5732Uh3b3IlFOgt-2FPrlAiOU0U15PKmPXcvjwU0PRoJxyFuoa-2FBKclDp-2BEPG5punL5xjVzdFHzmsnD1moI-2F3F3RhuWVijFMuoI2HXnAJWh9-2BnDdaPaMdwrpERLqBxTpRxshEqWJ4IZGmpzNnvMMHhWWbt-2Fv5DM07KnZCMyQjQQhzU-2FRzY7btAcqDFyaXYxaFRV9dubLUigS9ymV-2BVlVoNWJVjel8KNloqEW2Q84bJzQW7dG-2FV-2FbxJrDME5Tny0bnJXc4nDlkLYAhh9b3WTk-2Bw5uMcAfYLj9gw-3D-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133332661604582117" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4952 chrome.exe 4952 chrome.exe 3852 chrome.exe 3852 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 5068 4952 chrome.exe 70 PID 4952 wrote to memory of 5068 4952 chrome.exe 70 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 4404 4952 chrome.exe 74 PID 4952 wrote to memory of 3796 4952 chrome.exe 72 PID 4952 wrote to memory of 3796 4952 chrome.exe 72 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73 PID 4952 wrote to memory of 440 4952 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://applink.2book.com/ls/click?upn=yGstQWIQMTt3852mGEUneqtSbHkUk4x0f-2FX1O-2F6S0v7s-2BwMjAcFMnLYiyj-2Bz6nY4-FnV_pGxwouzDgm5QiDoADxfTOTdcyaABbCnLBDalS7SnH9buzj08j-2FxerB5732Uh3b3IlFOgt-2FPrlAiOU0U15PKmPXcvjwU0PRoJxyFuoa-2FBKclDp-2BEPG5punL5xjVzdFHzmsnD1moI-2F3F3RhuWVijFMuoI2HXnAJWh9-2BnDdaPaMdwrpERLqBxTpRxshEqWJ4IZGmpzNnvMMHhWWbt-2Fv5DM07KnZCMyQjQQhzU-2FRzY7btAcqDFyaXYxaFRV9dubLUigS9ymV-2BVlVoNWJVjel8KNloqEW2Q84bJzQW7dG-2FV-2FbxJrDME5Tny0bnJXc4nDlkLYAhh9b3WTk-2Bw5uMcAfYLj9gw-3D-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa4d259758,0x7ffa4d259768,0x7ffa4d2597782⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1912,i,17382781208966931890,18309190666675098716,131072 /prefetch:82⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1912,i,17382781208966931890,18309190666675098716,131072 /prefetch:82⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1912,i,17382781208966931890,18309190666675098716,131072 /prefetch:22⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2648 --field-trial-handle=1912,i,17382781208966931890,18309190666675098716,131072 /prefetch:12⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2640 --field-trial-handle=1912,i,17382781208966931890,18309190666675098716,131072 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4464 --field-trial-handle=1912,i,17382781208966931890,18309190666675098716,131072 /prefetch:12⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1912,i,17382781208966931890,18309190666675098716,131072 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1912,i,17382781208966931890,18309190666675098716,131072 /prefetch:82⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1912,i,17382781208966931890,18309190666675098716,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c1b996d81ad11277112a154bdf9cc08e
SHA17b460e1b3d0fe07cbfb603f41f93aa2a28476b55
SHA256491e32132b481c3ed29574d4b9b87f889ccbf3bd2e3cefc62eb40b15ec67ea68
SHA51276e348476977349287df56da9f6e360194a57e4aeed73a50cc435c5cd311b899175a1f871fab945344f9836600a687ff5562ab9ad7eb903185205d52120e7783
-
Filesize
5KB
MD5bdda5e96aacaaa5e3295583fb8c6cf6d
SHA18074139d924beb80f645064eacc51a873850f4e6
SHA2562d17654e8a72fea22c68f569767df92c43f822c6d55db693e4572215cc2df3d2
SHA5124ba3fc2521e30e40a54ac099057706be8fc6a20ae947efe6d1175e428a8c92702902c92fdc38b0897dc09f250d635a8668c4b90df44aad5d8a3ab429837a932b
-
Filesize
6KB
MD56047dc96ba944dc65247aebb5d9df918
SHA108d33cf05567ac834161b9f08a59d90637c5b8c9
SHA2562162ee231304e6dd71dfb1751ea78807ae6ee4b7b6ce2d6bf1cf51765260f794
SHA512d541e7ff67c492a4a70de555abb4d32cc8c60261bf0adb2795f55511f9534177b7f245bd5e96e8af68e61d76c27f95414998dcfca0049713f19e7b40fe92fa70
-
Filesize
5KB
MD57f0cbfcc0f9faa8fea9cdb8900627454
SHA134c6313282fd3593c1a56c0176e3f215a923cc84
SHA256cfed3be310cd085d8785dc1ae9127aef8976d3f93c64bce2c28e5deef8a84119
SHA5128960ee593ca95818b71f459c500cb718468ec7477e852b7f570928f994a9501c7e618bf14c8157be07c10cfc523c45c986f7e911586f794f53543493b196a370
-
Filesize
172KB
MD54b8a760c592e930ee0f2ee3362cf7f65
SHA1dca08e90523ae5d1cbd21739e41c68fbbeaa519a
SHA25631ccf9cf559d7c273813f5c479e0c5267bf2831ce6b6de619ea321b7fb278e19
SHA5126c95a7b4749d856ab8ec9f571a09c6f00e4971df45de206ddc5b9445ffa225c310e692c5648669b9fda7e4ee85f41d9085a007d6b396c79486f4e5c374515df0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd