Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
22s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 17:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.zdentistry.com/
Resource
win10v2004-20230703-en
General
-
Target
http://www.zdentistry.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133340902796619374" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1880 chrome.exe 1880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe Token: SeShutdownPrivilege 1880 chrome.exe Token: SeCreatePagefilePrivilege 1880 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe 1880 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1880 wrote to memory of 948 1880 chrome.exe 77 PID 1880 wrote to memory of 948 1880 chrome.exe 77 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3328 1880 chrome.exe 88 PID 1880 wrote to memory of 3720 1880 chrome.exe 89 PID 1880 wrote to memory of 3720 1880 chrome.exe 89 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90 PID 1880 wrote to memory of 1064 1880 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.zdentistry.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1aad9758,0x7ffa1aad9768,0x7ffa1aad97782⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1912,i,14872313174109671286,3531130970030122712,131072 /prefetch:22⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1912,i,14872313174109671286,3531130970030122712,131072 /prefetch:82⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1912,i,14872313174109671286,3531130970030122712,131072 /prefetch:82⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1912,i,14872313174109671286,3531130970030122712,131072 /prefetch:12⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1912,i,14872313174109671286,3531130970030122712,131072 /prefetch:12⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3956 --field-trial-handle=1912,i,14872313174109671286,3531130970030122712,131072 /prefetch:12⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1912,i,14872313174109671286,3531130970030122712,131072 /prefetch:82⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1912,i,14872313174109671286,3531130970030122712,131072 /prefetch:82⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD519a942640b751fa930438ae54e2c1bef
SHA1d42fa32d24199276791ce6e1769630f10b5734c1
SHA256cfa0619fec2aea1619ac57cf35e7eda12781be97f74793b5de5aba2c110858e6
SHA5121adbd441522e9a53e26f1b82f2138f912a9f9f3e6896ca1214bf33fb079e37f3dd4c2a74079f7301c98439ea1b7c27838dc7ea88dea89db9ed54b16e3e6d50ff
-
Filesize
873B
MD54c2f29101d91198c1083588ea9b1785c
SHA1628fba2f21ad8bdc30f551ef06d56ddb81c6411e
SHA25613b5fbbe3d34dfe82fbd8eb74e557bd1c175c5ddbbfceb8318baba723961578c
SHA5128d4e407e9a0181f25683cad12f5517ce57d4209fa8063c458cd60d2de4137bc774e5b96a452574de30d2b68fe1e6d20b748710e80cdf7024eee2acf8fce71114
-
Filesize
6KB
MD54536373a534ebbe43c68c46213100342
SHA19c69fd417c727548e62362f899d624c83773d9de
SHA2565e59d6ffcab1c9c2b98096d00492b7f3a72b346b738f3743dbe3e05662f51ce0
SHA51246f67f665530b58fe53b62d0c098875f43d5c19a0cb76b04ddf57a08e51d02fa78093a5ec1718c7fe6db58848bb747100087f359982ea3e20258bd63fc092cce
-
Filesize
89KB
MD5c344be8a2f7db1a26011639b32908730
SHA1baf236475779944e399e363337c0a88b159713e5
SHA2561d8c79d17c0dfc4ae8b94faf787a9f1be89b82570a07f18e3c69324a08809002
SHA512c731c06e8babe45c955d4969d2afceb2d2261f44c08353182591c7d49efa5cfc7376df9c328c5fe608d3c2e8f9cf506f38b44d1527996b5f5ccd2c5281a5f979
-
Filesize
89KB
MD5502710f28302ec06ce92aee3034a51f4
SHA1ca5f8e1607eaac154f632928519f54789e9962c6
SHA256a0ac8806e261883018a574619cb5b902bcaf3735a2c2143051f666666d98141b
SHA51277a134d6634a6f80d3831f1703ea47d10109e06803a6b7112334e48e3d374ab3714a94e628eb22992ded29aca8206c0d87d1db0ffd923d3b9e461779c2ce5071
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd