Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2023, 09:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.ftsindia.co.i
Resource
win10v2004-20230703-en
General
-
Target
http://www.ftsindia.co.i
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133353568820958420" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1088 chrome.exe 1088 chrome.exe 2528 chrome.exe 2528 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe Token: SeShutdownPrivilege 1088 chrome.exe Token: SeCreatePagefilePrivilege 1088 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1596 1088 chrome.exe 59 PID 1088 wrote to memory of 1596 1088 chrome.exe 59 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4988 1088 chrome.exe 87 PID 1088 wrote to memory of 4748 1088 chrome.exe 88 PID 1088 wrote to memory of 4748 1088 chrome.exe 88 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89 PID 1088 wrote to memory of 1008 1088 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.ftsindia.co.i1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b73c9758,0x7ff9b73c9768,0x7ff9b73c97782⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:22⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2764 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:12⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2756 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4000 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:12⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3132 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:82⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4072 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:12⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1740 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3568 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1088 --field-trial-handle=1712,i,7539040759195924520,5706529072156091929,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1160
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD556001edd8d0d8b89589b8677fc729f79
SHA1fe75635c0fcb7eb716c01419e5f36f0219393f13
SHA256adebc9c4257a66d1cf9ffdbb994967c5eb4dbe46fd80d1ad22d527a8c02c30af
SHA5126faaf5d79ea3df66371a51b55c2566cccaba318a6c4013db4d06dfb662df3ec375e75e4506c1a6462afa73d05a95b6343e92d2af0ed89669a495a893df48967b
-
Filesize
6KB
MD594b9b7829de68ec4f3fea2f572ed3fd8
SHA1ef2853656742c7bb4ee91b549f64f11475bce28a
SHA2560a8712ea07f4d6c77fc01e1a0821c79d86083eb900d616fe7f010bca15fb190f
SHA51214f80c4128f7ce541925464ef40423d9b47096a408c39b72af9cac7685adc3e9f3940c8b3d98f0a8cd435249575af2efc041186c4158fe4fe4c16ff733f699c0
-
Filesize
6KB
MD584dae748ba72f147cd45964855f932d5
SHA1a7f932bb756e8ec7fd751a5525d221aac3a2d21b
SHA2561fe0be8ff07779aac8f2c70c280d7daa6e7485f0b53b91255b5cc8803b4af8a5
SHA512c04ad38e8ddb612ba9140d3a8e4e7ba373c96064c1155452a1d7658b98a850a6c6a35c4504f153c8a147d3c1c4386eb767d3edc2548e8e438806690e7ff1f0e3
-
Filesize
6KB
MD55d19a68799b6c99754a75ea8fb1f6e5f
SHA1dbf3698ea8c04e812ae637f1a8067b5d477a1fcd
SHA2565e8aac6b49fc5e67d33cf2d7a0542c0609779ec2c80d9a6f2911a61f5b119b87
SHA512950a475190be4e207464a9f53a1012ff242d7ed0d682856c75746764afa45e65cc5c132462f9b54af192f7219c1117a3d485e0fedc387c3b51a3284b8780957e
-
Filesize
87KB
MD5661b861402d0407dbcfd6b1793fb1ab3
SHA183fbe7acdbc21df35035a8a2c67bda353bb9d76c
SHA256b4465e2fa382b8a44b39df4c4c54546cd2f603590b1d1acd11b1a2c5208d1876
SHA5125b09c8b7d3f5b4de2076040bbd49d177339773202e67c7bf4ae0a70759cb6e9c4d01a5ec46e08accf5108482cac8275217af85d2e517c88169b92ef119cb9340
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd