Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 19:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://news.aiccampaign.com/p?h=HwOLjtfiGRoyVfP9G8tDPJVtIgAEaC&activityId=10205618&target=https%3A%2F%2Faccesskings.net/year/DOMC/Ym9zLmRvbUBzY2FuZ2wuY29t
Resource
win10v2004-20230703-en
General
-
Target
https://news.aiccampaign.com/p?h=HwOLjtfiGRoyVfP9G8tDPJVtIgAEaC&activityId=10205618&target=https%3A%2F%2Faccesskings.net/year/DOMC/Ym9zLmRvbUBzY2FuZ2wuY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133341825470168148" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4192 chrome.exe 4192 chrome.exe 3504 chrome.exe 3504 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4192 wrote to memory of 3696 4192 chrome.exe 58 PID 4192 wrote to memory of 3696 4192 chrome.exe 58 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 2108 4192 chrome.exe 91 PID 4192 wrote to memory of 3128 4192 chrome.exe 87 PID 4192 wrote to memory of 3128 4192 chrome.exe 87 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88 PID 4192 wrote to memory of 4048 4192 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://news.aiccampaign.com/p?h=HwOLjtfiGRoyVfP9G8tDPJVtIgAEaC&activityId=10205618&target=https%3A%2F%2Faccesskings.net/year/DOMC/Ym9zLmRvbUBzY2FuZ2wuY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1d109758,0x7ffa1d109768,0x7ffa1d1097782⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:82⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:12⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:22⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:82⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4768 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3800 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5508 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:12⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5100 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3780 --field-trial-handle=1860,i,8408608579015044046,5731650964967757429,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD529e4565c91204b3f5f174ed931471f09
SHA18f20faa6b4ee091932da5f17d947c0db2209fc29
SHA256b31c5dc92c4794546cc6ab18cce3c9a4b83026f4d7c03208547a579a607fb550
SHA51243ee359d516442afa49a1ae9c9a399048c3d033def8e6534a92bf95385202ceb3824645ca074a4f7a58b2951aae64fdc6eeb8961df00ff1fcea410a78630a00a
-
Filesize
2KB
MD5d233ca42f336d4190853f5c398ad5b74
SHA1c88c75721626e99df66a4182527b90bda621b3ce
SHA256edfbe91f9491ec95144f1f8eabb82c8ef97a8a2f782769e221f054e29f8c9e99
SHA512efd73a2bab65235260f77e95896320db624e31d5460d2e8f84751746a341c66bc27ad32bfb8d469b1205f541c1ad6bfcfa36229b20d8b5b01a052c19f40e6a8b
-
Filesize
706B
MD597af5c4111e1af92f6904ef03a3824de
SHA16d0436b0a9bd816ff7afe7828ade78182cbd3dd4
SHA256b9f92a9006cf0a554d028a772e743c0638d84c75115aafeee83f9ad27ef4851e
SHA5127a18123448b6d05ec62a3ae52a003fde2d159b4fd0030fe868e48c9a8a863b3d66aac3ae0535e78400b8d51cd9cc12a66f63f47a7f101278f7af892d5e9e98dc
-
Filesize
6KB
MD5f508b144da5647660bcd91b46a612fe1
SHA12b7b82d3bb6bb7e12130bb7f1e54d4e54a0b7758
SHA25616af7d7401a94678df0a30336151241857bfce9edeb7345ff2461a240d55ed0e
SHA512e2f08bbd3ffe74c3e74376de932e941e23d7457545be744c6641d1a8ba81140f708e9e332dd60be2dfc898365bcc1b7fa710b98e2fd28f47a4a824f52cb48247
-
Filesize
6KB
MD557efbad4ac7559fcb9e8b8fa18cc3d92
SHA1c725b6eccfc5e2948601863f226bcb296b397515
SHA256ff489a8b647a8bdb1a6242ca36500b005ad2f3a981653ea433b68c751246d2df
SHA51261237ce27973f82209883ab76976cda7eb6536d6509637bc0ed2ed9db3925fdfea8dfee8a34e7fc398aaafd5d3c58ae3e86bff4cf2214f1e4261eb6c9871755b
-
Filesize
87KB
MD5e54746370e4c1a23cba19e3d85989d1b
SHA12dbb79bbc9aa601638eb03300307725c1bce5488
SHA25644581b8849c49d7f7f3555557ca7685cb4024a16afcda09a8a14ec12470618ef
SHA512b4e7c408b6a437e2c3e2c12032961979443e1a5906692bace8e339830a15f7c327c1567d9d85768aa41ded3eb87fad00e3487ebcc1bcafe0fe81d2ab48129f6c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd