Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 17:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://jjaci.quickbooksresources.click/?jff=wjaejZ2VuZS5zdGV2ZW5zQGNvbHVtYmlhcGlwZS5jb20=
Resource
win10v2004-20230703-en
General
-
Target
https://jjaci.quickbooksresources.click/?jff=wjaejZ2VuZS5zdGV2ZW5zQGNvbHVtYmlhcGlwZS5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133343476119710381" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3820 chrome.exe 3820 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3820 wrote to memory of 2544 3820 chrome.exe 20 PID 3820 wrote to memory of 2544 3820 chrome.exe 20 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 2188 3820 chrome.exe 86 PID 3820 wrote to memory of 1912 3820 chrome.exe 87 PID 3820 wrote to memory of 1912 3820 chrome.exe 87 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88 PID 3820 wrote to memory of 1812 3820 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb06b09758,0x7ffb06b09768,0x7ffb06b097781⤵PID:2544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://jjaci.quickbooksresources.click/?jff=wjaejZ2VuZS5zdGV2ZW5zQGNvbHVtYmlhcGlwZS5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:22⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:82⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:82⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5016 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:12⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4676 --field-trial-handle=1896,i,7206167342094142407,6871748238401561836,131072 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD520e0ab40f1fb84c8dec0f8a06a0720fe
SHA1a89f9c0e0473f383c989403720ffccd39ab20433
SHA256ef15266b5794f201827cf107869084f2ed524e5da2a2cec43568de8795a3fc6c
SHA5123fa7e1c6db57f64e3aa8d05a5dc250b9eacec93252cbcdbd5b7915b172ecebbe494d2b3c6413c1ca05448a034d7972aa4b5de6f6d3d764e900b4ebabc94e277e
-
Filesize
192B
MD5d82692c77f393aa8fb4127b29fabf5ff
SHA1ac2d8058851ee8ce2ecd1693714415727f782999
SHA256730983b871707f6ddaa8e288d48f524fea77f39868322deea137538ff72c1f6c
SHA512026dccf55b488b6e437ee95c49a8882e03d84430299ce1f65f66c209ac298546979fe3c64b00ba276d6e93a40c9adfba53157bf5b46b5865a48debdde0830644
-
Filesize
2KB
MD57dacf30653a51769e954e7dbdf5f4ac3
SHA1c3a57da8557587ae00a8bd2752b9654163e39f2e
SHA25606b17bcc9f1b69860864dd822db77cc28580f57a84c749da7969b61ce5626d96
SHA512c3251ab2542736a2a97d5021305ab6bc3c6fd606258e4e543c5d72ee2cda4e7cc03451e240244a95eb862e8a45c61e8e82510cd5640ef8d719659180e12278d5
-
Filesize
5KB
MD5ba0ee56cd1b74cea2d1a5b45aa625c1a
SHA158b837d5251aa296faec9961f70e72942d0e15a0
SHA256f463b82317baaca33b143058b9b2fd8b97b3927b92d6f75aa18223089199422a
SHA5120825181c85689911c16ef0d68715d70b16a436cd1d2ddd251b14820c812caf65a339a90286c5f83747e5aba98e4995d9175d9a5826355a9bae41642b6b631279
-
Filesize
5KB
MD59d68650e1d0698278ddba6853d3bffe5
SHA18136f97de20dbea684dc89515eabcf794a081677
SHA2564a7514e0822cda3c14a02b46793678d147e055cd30244d10b1e374ef81dbad09
SHA51280e188d0976fe99b728b1f6d34588593907f87868a7e2e6a9b243b9ec2dce023a8fbe523a2ad6b90447302da522a98f70d7004f0de6dddc843d9982635ecd48a
-
Filesize
6KB
MD5d1dac81198e1fe52afbaca48c3d1ff2a
SHA1eae878604a5b9a8b9df8f0e750146d787ae35636
SHA256d24b3ce314afdc2657717d3cd1ba96a28b8f0ead664fcf134ee148a870a19470
SHA5124dc5c32e48848f28b94f53b4ed7dfbdba6381e3c3e6bca7ebf15c14dd29d7b39c7b5da1cfdb4c0bba7067026b5aaf38ee76a0e1d04d093530885ca8037cdba0d
-
Filesize
87KB
MD5f665fc98947c7c05414f25ef4a70abf9
SHA18ea5e58d3786eee5add9199f97ca09c8dc6635d9
SHA256803f3966a8a3b60a5bc9f8ca43b5ea879f6095301d52ae87fe50e4f911dc2f5b
SHA512095cd9f9e9399d9f64b8c44c9990891bed4612ab002b7fe4764494c2e832f1e3c93893e97cb2c738045bd1d3589753c164169c5e8b3a811b74b9f0dcf01c17ad
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd