Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
542s -
max time network
493s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 05:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://singlelogin.re
Resource
win10v2004-20230703-en
General
-
Target
http://singlelogin.re
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133337013019413961" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3104 chrome.exe 3104 chrome.exe 4492 chrome.exe 4492 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe Token: SeShutdownPrivilege 3104 chrome.exe Token: SeCreatePagefilePrivilege 3104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 4716 3104 chrome.exe 82 PID 3104 wrote to memory of 4716 3104 chrome.exe 82 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 1160 3104 chrome.exe 84 PID 3104 wrote to memory of 3752 3104 chrome.exe 85 PID 3104 wrote to memory of 3752 3104 chrome.exe 85 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86 PID 3104 wrote to memory of 3732 3104 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://singlelogin.re1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe37dd9758,0x7ffe37dd9768,0x7ffe37dd97782⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:22⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:82⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:12⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4900 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:82⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5204 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:82⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:82⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:82⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2320 --field-trial-handle=1844,i,16383529696873885385,2905446915478411393,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD54c7651c427e43cd8a5f3f300b5023f2a
SHA1006aa6439bf2b5fdf53a2577b53a4b54991a0afb
SHA25684fed0d634f19b2fd75f3d3ff37af460d1e70c3a9a68da685608f7cfea98bb84
SHA512c55e9fc092b5d9d6650962566a8ac315099428f65de8ef2d641273a9a3e8d649b513cc349bb59b3c548e3f9d1d7575d143e68f3b55ebe6d44494051038c40b4f
-
Filesize
3KB
MD5a66afa7598230b7e6a623fed16990583
SHA1b5707208c16a029863064e12d28551cc605402d3
SHA256f4fab5a66f0d604b0b91c4d48beae2d241d76a8e8ce6921bf3e674a5b28cf29b
SHA5120eb880178ab910c0c2b3255324a0031085ee6a23cfe04e69aee17aca45cb19d7628497ba12d5fbe6eaee0be946464ad8c094e740e3208c92c39c16d4a21f9801
-
Filesize
539B
MD547f7ecfbd0eb3e75d09adc0e036cb3e9
SHA186c2fe91c01ddea0dff15695db908f42086bb5a4
SHA2565d4d0df80e1efa7737a4c8d6951bbd1d3f32c287b5297a8439c90b61b2e4b76a
SHA5127ae981c865f88da7e218fe621e25f1853f8c92b1fe85e82cb5e63526379e2f20d956d77dbf080df4b2fd7f6a8107ec0f0c95ef668599a903365cc20f9a33b0fa
-
Filesize
6KB
MD58c4eb979a62b7b6615eed0d4910de1c1
SHA14cb6421acc75ba822eb912c5e479d79092b87a91
SHA256a958aa57d960b0c762d7a7ee54dae2837920b7e354313b91f5049d148fd753e9
SHA5126bb95c32d8cef2b484d1b70e984f5016a5befe80e31be73b4234fbb863a9d723a2ad5702a958cf8d5a570ba5247a4975432e4771b7de23ec377a2938dd40e4df
-
Filesize
6KB
MD5c7592e01f9cecad33a80cdd9434f43c2
SHA1f5284b2c9388a5526f747374a58cb0f65efd3300
SHA256118800c0814feb06d987e70b699f0b4c053e5ef0e588a7b16f2fbca7f02d1347
SHA5123279ee817e6d537c7be16e72a42f7d07c8f8d44299468246bc971c6832f1304846f97e760933618c177a7f42121fe26a2f3c074131f322462c22e2fc639985af
-
Filesize
15KB
MD536277a179b7a6a2851789f0107c19e84
SHA19fd92a753e19241ab9b01a25f1e8e67da1273a39
SHA25698f30be824053a0e6f553fb2d9113519c8292ec964ce23f2995e521e82bf4ef1
SHA51284879fc620b73cd5753498493cc496bb7721df864aad42ae3328615aae53dacfe2d3ebdcd00bcbfeeb7ad78ee26e6cd77b307c4a1b0658743efe9d5b957b58b3
-
Filesize
173KB
MD5a36225ca9d6a79b5b8e17d3cdb63a651
SHA1e7689e8a51467888e9a24c579cf06f1e503b0888
SHA2568a98783303cb6e630c8196fa1aeddeed4332c6fece8216210ba055264622339b
SHA51278a1d4ce878d7a47f421e284178326afa784d041c28e96393383708bd1b749415fba7dd3ceb239b2f0323c5f48a57a23c6341872f0855fc135623f61e0312292
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd