Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2023, 06:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://iqconnect.lmhostediq.com/iqextranet/iqClickTrk.aspx?&cid=PA16LS&crop=0000.0000.0000.0000&report_id=&redirect=https%3A%2F%2Fmjcmetalfabrications.com.au%2Fnew%2Fauth%2F%3Fuserid%[email protected]
Resource
win10v2004-20230703-en
General
-
Target
https://iqconnect.lmhostediq.com/iqextranet/iqClickTrk.aspx?&cid=PA16LS&crop=0000.0000.0000.0000&report_id=&redirect=https%3A%2F%2Fmjcmetalfabrications.com.au%2Fnew%2Fauth%2F%3Fuserid%[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133334457094413711" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4444 chrome.exe 4444 chrome.exe 2016 chrome.exe 2016 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4260 4444 chrome.exe 45 PID 4444 wrote to memory of 4260 4444 chrome.exe 45 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 3184 4444 chrome.exe 86 PID 4444 wrote to memory of 2956 4444 chrome.exe 87 PID 4444 wrote to memory of 2956 4444 chrome.exe 87 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88 PID 4444 wrote to memory of 2704 4444 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://iqconnect.lmhostediq.com/iqextranet/iqClickTrk.aspx?&cid=PA16LS&crop=0000.0000.0000.0000&report_id=&redirect=https%3A%2F%2Fmjcmetalfabrications.com.au%2Fnew%2Fauth%2F%3Fuserid%[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde4119758,0x7ffde4119768,0x7ffde41197782⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:22⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:82⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3328 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:12⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4616 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4928 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5140 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:12⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3264 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3212 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4696 --field-trial-handle=1860,i,17935012914550375283,10999745286641472933,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD56268a6396ef4b7c1b024269fa29fa6c3
SHA12ab5429df6cc8d7acc4022161213596cb69469e0
SHA256b11318b2f75e4402c7bfcae3b0fac571abf35fbedfe77a3f43eef4bb836b5119
SHA5129ba7827fa4b9e3c3933941b55c332ded57364db9429308b1e4accd8e14c8829f306091f943081e5a508ce3c7883eef77975d021e7dc35e9850305af8fe60fa0b
-
Filesize
2KB
MD5b7bebd91e7a56f8f28160b05c1a260d2
SHA181b9ba87dd19b1d1a38cc36ca515ab9742afaaa2
SHA2562ef713e3901006f8757edb3fd01e592cfc99da000d552a3f6621f16bfa7994d7
SHA51278ba2d3fb6aeb6c2fa3e04bf5b47d6f1c4b22bbacd3309c4e52671db0aca91f52d936b8b8e017824be093ca1947747c7875b0037c4a826fc0553d38adb2a5a70
-
Filesize
705B
MD5b9e368b9ad0bdd6b8853590577b92f92
SHA1c44bca38e5fefec837bdfd8525b110c2f3b65bf9
SHA256db4a03054ab53a03786564b986376b5a026a2346ccd66093ea6c608ba6e0d881
SHA51212535485688bb9b875bf826a030cc9361d5c19e5cff84ce1d7a3965a8efdc1cbba537f10a82cd32cc4964fdfbb71b447f897919cda0bf8ee11dffbf1c071dcb6
-
Filesize
6KB
MD5a1910195151944174c342ec094cd2d30
SHA1179d59c5bb9c27ca22456973d67cd42a7219dc93
SHA256730e6f5a71edcbb4a872bd2f12ff401ee7b373846ce416f62823cc046270860f
SHA5125589db956bc81cc06e359d87035ec3bf69f401ca94d2e303173eb5d768eb416b468b913a339f4b6226c2b5a23b7fd0fa5adfcd943f683b5d721e7317c3f399b2
-
Filesize
6KB
MD5b86611bc18eb91d6979102323e1e680e
SHA1a01477793ddf28cab9cb98198a2422f50ea663ab
SHA256c50fe8049fbd0ee546ff0de08b60edea485c085f78b35c049ade6e8ff3d5187a
SHA5122cf1a9e10b1a1ffcb2a3c3d51b87f3f96728f69c8ecb3e3e2a8b3e2193a83eb1ae38ec17d31f18b3727860614d549f51cda94ef2e899cba09294161226ae94c2
-
Filesize
172KB
MD574b48b72b58ac63ee1169c317873c1ea
SHA10e3acaa6af39f29b3815cd25d46b126205478f07
SHA256eb1c533e80934b04734bc770d913fccd66c8d652fb9d9353bb9d298ef359e739
SHA51259b9b5b16753a29a018d5c1da92cde38122ab05097d3fd5e272f52eb1661c0c4bb702bf05ec7c4435696a304dc72619ccc0f78d3637568ae57223a8c564530eb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd