Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1692s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2023, 16:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://t.ly/J_Cai
Resource
win10v2004-20230703-en
General
-
Target
http://t.ly/J_Cai
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133353814859997079" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe 716 chrome.exe 716 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe Token: SeShutdownPrivilege 4680 chrome.exe Token: SeCreatePagefilePrivilege 4680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe 4680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4680 wrote to memory of 3312 4680 chrome.exe 44 PID 4680 wrote to memory of 3312 4680 chrome.exe 44 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 2480 4680 chrome.exe 89 PID 4680 wrote to memory of 1548 4680 chrome.exe 91 PID 4680 wrote to memory of 1548 4680 chrome.exe 91 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90 PID 4680 wrote to memory of 380 4680 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://t.ly/J_Cai1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb502a9758,0x7ffb502a9768,0x7ffb502a97782⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1900,i,6159016671302037340,17718222980794861535,131072 /prefetch:22⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1900,i,6159016671302037340,17718222980794861535,131072 /prefetch:82⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1900,i,6159016671302037340,17718222980794861535,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1900,i,6159016671302037340,17718222980794861535,131072 /prefetch:12⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1900,i,6159016671302037340,17718222980794861535,131072 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4516 --field-trial-handle=1900,i,6159016671302037340,17718222980794861535,131072 /prefetch:12⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1900,i,6159016671302037340,17718222980794861535,131072 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1900,i,6159016671302037340,17718222980794861535,131072 /prefetch:82⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2624 --field-trial-handle=1900,i,6159016671302037340,17718222980794861535,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4872
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD50319be750a6811eff93d1dc6b2482c5f
SHA1ef274a50a287fe6fe76a1dac7ead05d19fe3c3f1
SHA2560b36b463c267e77ea93d72e5e9f0203394707074cb17226dc002c84858141b0b
SHA5125934009bee133b3ab31c07b488734fef2cd9176e77b4ade0000b6165ebd794ccc3efe7caec8d05bb737567d2bf41cbf5eba46f3215982d1e14ccbf8c0f959855
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
2KB
MD5d67968490a187c62d6c7af273d15975b
SHA11fd523f6dd17b750d470ef533ff39d41e664523d
SHA2568901b28eb5d0d8b5d3739686c3c23aefba07b32258e746cd2cf82a2de85ccf4f
SHA51235644ddcd5a75084e275fbacc36f3be13955365cc04d3ace40f896ef2cddb78bf5976aa58c733a61790a55984abd46c7e93259087a6899f60efc466134f078ce
-
Filesize
705B
MD50cf49df426b14b8fb4017f9f1008e168
SHA17e026b0405c5f19d91ab525fb43bcd9cff799c95
SHA25614b6a7d1ad5e99e6d625e0b9970b65d3e890fefd0e0e7e6f086cd6a3c9eabe3c
SHA512b722f443a9dc3c7a43d1b068ec72b03cd48956f211e216824cfa58b94959e8c77dc4dec5d84a711705cb9b6199a7b1f960edb4490ccc733b44df1cae3d737701
-
Filesize
6KB
MD5651375379f0d0f5c2ba986960b9d6928
SHA10fd002831b7f17e5e56080a49d13232c5210bcfe
SHA25611363fb114dc34e1248feddf88311199480219b8f759fffa56a018510ba356a8
SHA512cb39007fb18d3be3edb42f4fa0c962da12a7956e69f335e81c8c010457cd792aa7f692d122159e98915ad6780c5d475e9cb5aafe5bb336e17924d342b2b5d516
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD51ac1276d44808b9eb16581a62379f570
SHA16f0ff19d617e6bdab1066ad0da6c28036ebe5c25
SHA25609e77cb55bf7c0b4c30c9244373d3c5f198b2d7efc4186d9c367bbb0a517c50f
SHA512d10cef42d1bb96b8efe31df5b8a0d22a5a38c96f85b65b86bbfb8bce5b133d2654705d70ab7b8f689b9665042ba53464f347efe45b186c0e14e5d6f0303247ec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f397.TMP
Filesize48B
MD52021bb5d2ae95d15c99e93127804c8af
SHA1d83291065cadcab0f1fa612c9493ce3164f256f6
SHA256a6ed94aad524fb34816ac53f836b7fd18b4c8ce19edbe1044dfba34433a22f1c
SHA51205226070a3798063b7e4dbb68a6e8869d22d7e4a6a25dd037d8ad461f14b9f70022695868e4aa9c258fc4fa15b8c031d478b332d89458c2a176194dd5cc3165e
-
Filesize
87KB
MD55944535ea40c97d52d286acf11431c07
SHA1774bb7b414e63f01c4a4b9d922e9d49cc347a0a0
SHA25693d7ba015857cf30ef6ac73c1a0342c590aa3e420537233d57b5dea40db562e6
SHA512a7348878462ee449bcdcca9d31d085bc7e90594b0bb2c4629c6a0c36955ff3cf861b4e759e1395fcfbe3f791cc8d82415045d1905998dfa045da483ac452e10a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd