Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
14/07/2023, 13:20
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://media.mailadam.com/proxy/index.php?https://pub-215e6422b0bb4f4ca003961b652ae466.r2.dev/xop.html#YnJ5YW4uc2hlcndvb2RAZmVyZ3Vzb24uY29t
Resource
win10-20230703-en
General
-
Target
http://media.mailadam.com/proxy/index.php?https://pub-215e6422b0bb4f4ca003961b652ae466.r2.dev/xop.html#YnJ5YW4uc2hlcndvb2RAZmVyZ3Vzb24uY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133338145787661362" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1660 chrome.exe 1660 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe Token: SeShutdownPrivilege 1660 chrome.exe Token: SeCreatePagefilePrivilege 1660 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe 1660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1916 1660 chrome.exe 69 PID 1660 wrote to memory of 1916 1660 chrome.exe 69 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2364 1660 chrome.exe 71 PID 1660 wrote to memory of 2716 1660 chrome.exe 72 PID 1660 wrote to memory of 2716 1660 chrome.exe 72 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73 PID 1660 wrote to memory of 3268 1660 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://media.mailadam.com/proxy/index.php?https://pub-215e6422b0bb4f4ca003961b652ae466.r2.dev/xop.html#YnJ5YW4uc2hlcndvb2RAZmVyZ3Vzb24uY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff953ff9758,0x7ff953ff9768,0x7ff953ff97782⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1820,i,4771110254852053184,110364105161683630,131072 /prefetch:22⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=1820,i,4771110254852053184,110364105161683630,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1876 --field-trial-handle=1820,i,4771110254852053184,110364105161683630,131072 /prefetch:82⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1820,i,4771110254852053184,110364105161683630,131072 /prefetch:12⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2708 --field-trial-handle=1820,i,4771110254852053184,110364105161683630,131072 /prefetch:12⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1820,i,4771110254852053184,110364105161683630,131072 /prefetch:82⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1820,i,4771110254852053184,110364105161683630,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4744 --field-trial-handle=1820,i,4771110254852053184,110364105161683630,131072 /prefetch:12⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4756 --field-trial-handle=1820,i,4771110254852053184,110364105161683630,131072 /prefetch:12⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5fb85bdb4382acd080b3040d4fe2d87ae
SHA1fd3e9ea941b83bd39176f5f671b81b1e8d34e2ce
SHA256e51aa4d1a37d99da9ac0d674cbccc805358004d0176e7b8d1f20bde9a15b6f8c
SHA51225fdcdebcd153fdf07b65909027212ce7ff6728f8d926fa892d55a1d21b860d71eca3fbb80b3b2b1ddb495a41fba6162969ebd30d2c61f70dc1939ad78c94d96
-
Filesize
2KB
MD591596380f3ab7ab4c00d63bdd5ab1890
SHA1eef28ad908e6cc0353414fb8d51b7534c09c423d
SHA256921c12730898ba9ab9bb7fbb964e9ff6fb267779b29a58ec71a84d3a4148ebc8
SHA51202e35dd084fd6ecaccc582d7ada8dd32bdaca0560afb02030846c153b39abccdb1870454f407c93b8094081bc5612ede5055830ea1c02f0f4056545b3dd9f51e
-
Filesize
1KB
MD5f6f61015ac7bd16eafd1c39a7226a9ad
SHA15d9c6b278f4107f58a661f14cd560a7323da8718
SHA25681b347cbefcfe320917a9748289bbb3ed708aefb2cace786e1e82ce83c590ef2
SHA512bc4c642ea88f60c4e3216114270c580405552dab4d26074627d07c410da802fc3c9f9b7a061e4e529bd187284a7c38dba75cdfba2a28c4fa04835dc3369687da
-
Filesize
874B
MD593de3665b5cfb2dac337bbd60ea0fb4a
SHA1ee322faf2450431c71a6a992f5f6f3a7fead513f
SHA25640fb3e539333fed56244e931a425a9ca4f1b7eaf8399f513b2b5df8728924cb0
SHA512ee418b1275d1d6cd13c12350675a0859835e8c727e345e0f6c154d654e4be5130484a40a542eecb57a2e9ddf05a491a94b2a90c3f85bc46254ecc367b44afa03
-
Filesize
874B
MD541bdcc11b72a64b15a8a6220aacab6f9
SHA1d4319a17420eb58475ecc3493f8d51b3564f39b6
SHA2569fb2408a971084b23f4e471bd6907acdfb5b306e6de88491f0917d5111f9b83d
SHA5128d3dd92803dd7313799c2106242906971960ea5913a1bef26fa8134ef82a8cb9226e75997ab91c6afec5ddd54f34c55d932f20cdc31ee24f78ce90452bb12622
-
Filesize
5KB
MD50f390f2ca32de413f87995aad666763e
SHA1011de12c83927a9bca85d119f6ae88dfa86447ed
SHA25653c27e46d7e12f6237b0abb8a964539309832a0229a12daea690d3ee112a2b4f
SHA512a85f886d78306bd9c7585fb41944ff707e42257edce89e2423cfba4ab98d48e50495ac7299b75464f0e1587421b39cdfee450567003f0c9cc63bb70a30a3d934
-
Filesize
5KB
MD5da3879a60759ab32c197a18e5f2ef29b
SHA1f6b447e867350e0057a97f8ee3eb787e5657c172
SHA256599c41e6addffd2e0dc8d1435a24f283951aa482448cffe1e0d4b851c2a86e1c
SHA512d4a5f752f194af3cef0506fbfc8a0ae7d68d763ee8447e20b233f37ea744b053f88c59ab06abc23333403c2368d30c3148a1103ec337d7224fd3767e87f97113
-
Filesize
8KB
MD5587c1623c66404554393d31ef9405b88
SHA1c6ac28d15ad2b77b2f02e969c6dbd326fa0a5239
SHA256b21ed0b1be08d9ee8fe297ea6a1997499c888bd6cf1b77a6ed8e4db8823553b7
SHA51298fbedf316ede5c81fa0ac24412b5630cd87bd743936044754ac745a162387cf77e0b08deb1d954b71500ddd5fb5c5740b927f7a24e0feadbefe529612cfc908
-
Filesize
8KB
MD50ecc22eaeac48b0de8b5715cd7c84b32
SHA1433ab6f1ade47835efc3c2574e19c5a3238b7ef8
SHA256260e242cb42f85acab5aceea152300ccf6841f7698a6f5af0c08adbe2aebe980
SHA5129f952a8476661d810b3d8e6cef578664eb8282c159e014c8f9f4b96558e29c40149510459417564c717878178e49d0e731fc4ab7e4dc7f20a73484fcb6ad42e5
-
Filesize
87KB
MD56c44134aabb841033aebd745a2815fc3
SHA190aad9da8c666342365830ee7bb1d86665a96acd
SHA25683f43d74dad18d1c367ae53205b1de826f0bc0ec59cc5b3408c3ccd220fec5f0
SHA512521ade93a715056ad1c66107880030da5be73d7c10323d0caef0aff5153ad177943aab67f6ce1b9e4615eaa478e94df4cfb59cf9d9aa6fbdca30c65c19dbba96
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd