Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
112s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
14/07/2023, 10:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://keynotion.hosted.phplist.com/lists/lt.php?tid=fh1VVAIDCFRdAB8ODFcCGw1UBQkdUg8HUB5QBQRUD1QFB1lWVgBMUgBbB1xQUwQbD1IFAh0HWQYCHlkGUlUbDVJXWARcBAFWAgQBRFIFUAZfU1AIHQYLAFMeVQVQVRtXAVBRGlEPAFtQAwcPBlZXBA
Resource
win10-20230703-en
General
-
Target
https://keynotion.hosted.phplist.com/lists/lt.php?tid=fh1VVAIDCFRdAB8ODFcCGw1UBQkdUg8HUB5QBQRUD1QFB1lWVgBMUgBbB1xQUwQbD1IFAh0HWQYCHlkGUlUbDVJXWARcBAFWAgQBRFIFUAZfU1AIHQYLAFMeVQVQVRtXAVBRGlEPAFtQAwcPBlZXBA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133338043053821688" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5028 chrome.exe 5028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5028 chrome.exe 5028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 664 5028 chrome.exe 70 PID 5028 wrote to memory of 664 5028 chrome.exe 70 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 316 5028 chrome.exe 76 PID 5028 wrote to memory of 4948 5028 chrome.exe 72 PID 5028 wrote to memory of 4948 5028 chrome.exe 72 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75 PID 5028 wrote to memory of 4208 5028 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://keynotion.hosted.phplist.com/lists/lt.php?tid=fh1VVAIDCFRdAB8ODFcCGw1UBQkdUg8HUB5QBQRUD1QFB1lWVgBMUgBbB1xQUwQbD1IFAh0HWQYCHlkGUlUbDVJXWARcBAFWAgQBRFIFUAZfU1AIHQYLAFMeVQVQVRtXAVBRGlEPAFtQAwcPBlZXBA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb1e209758,0x7ffb1e209768,0x7ffb1e2097782⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1852,i,13753140213427822673,11753025562287024114,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2804 --field-trial-handle=1852,i,13753140213427822673,11753025562287024114,131072 /prefetch:12⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2796 --field-trial-handle=1852,i,13753140213427822673,11753025562287024114,131072 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1852,i,13753140213427822673,11753025562287024114,131072 /prefetch:82⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=224 --field-trial-handle=1852,i,13753140213427822673,11753025562287024114,131072 /prefetch:22⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1852,i,13753140213427822673,11753025562287024114,131072 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1852,i,13753140213427822673,11753025562287024114,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD5511df7bb25cc188b33947e64afd6db6b
SHA198e66f6fb20ad67ed078cde9d02afba601421fb3
SHA2569f89d9c7df9cbd7a03262a766d45ea9b5c297d4d55a319eda5c228b67e0ef9a0
SHA5124f119ff2deddf57e3e19f369f735edf5ce2ba1b77c421707b50d08a3144bf886448442982130a6567a11144563cef5b8edc09c14f51f43d9b413162ad02ca4cc
-
Filesize
5KB
MD5e9c78b81f30ee736f22d844a83f53b40
SHA15d3a44e16f7087d7c2d85f4fcc148d558747ff34
SHA25689db74871b30ddad342dc7eb3a04d2be8793d147c0d13ad2e624c1a5468ce0d0
SHA5120ed366c320c0722762483e156b128496f3dccb49906e47f9ff22b2bbcc3977b6a4e07c8ac9683591bbef4b7904bd930ae37bd1ab74ea68fd2fba627c4029af3c
-
Filesize
5KB
MD514a5ed0c60df5c7ac4bf8471fe1a5713
SHA13209351ea36f931cb2db1b456449a44391a7d86b
SHA25622c3fb2b89a4f0cfd9d1c461d95609f506716873dabcc3267e2353e4f71ad2a5
SHA512fd0fb4f7ed39eeb76b38d1999b3582076a1b3cf0a97e6eb61a1930e739d420abced6d19c23599dfd5fe7fd4290f493587cceb67b39d49b775117cb5d83ebb2e9
-
Filesize
6KB
MD56516f7b0cfacef8c0f824b566f616c0a
SHA148c719bde2aad52a542fbead1dd94d240e0f33e0
SHA256821ca0087066146cf8db9cc62b82c539a3098c4de9a5eec96e0f3c62f3829ddc
SHA51283be0f2aee8fcda763c15bcb6421109d6e6885639cce43221400404b53e00108244e290a85ee9b6405b8e2b2ebbbb00a57e4728a46eac2f45f7963968716eeba
-
Filesize
87KB
MD5bed841b5398659d3871660792ad12d05
SHA1d1577ad5a516dc158e003a30fccb28e43a0d8dd3
SHA256176d45f63bf6be73769ac771a0e761df408b46f2dbbc3a7bd3d807ac407f4bd5
SHA512a7433edd138d84fb0a97da9348271f8ea64155bce590c5367d23b336b5c51179febae12f1422f644a7feed1c9bcec9de1b20c470b4488a9c92bb7a359969711e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd