Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
282s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2023, 21:13
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.linkedin.com/slink?code=g7vnm2UC#amFzb24uZ2VlckBpbnZlc2NvLmNvbQ==
Resource
win10v2004-20230703-en
General
-
Target
https://www.linkedin.com/slink?code=g7vnm2UC#amFzb24uZ2VlckBpbnZlc2NvLmNvbQ==
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133353979989915274" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 2736 chrome.exe 2736 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2772 4644 chrome.exe 42 PID 4644 wrote to memory of 2772 4644 chrome.exe 42 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 3404 4644 chrome.exe 87 PID 4644 wrote to memory of 2336 4644 chrome.exe 88 PID 4644 wrote to memory of 2336 4644 chrome.exe 88 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89 PID 4644 wrote to memory of 4016 4644 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.linkedin.com/slink?code=g7vnm2UC#amFzb24uZ2VlckBpbnZlc2NvLmNvbQ==1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe49dd9758,0x7ffe49dd9768,0x7ffe49dd97782⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1864,i,1309024451443408620,14363211272949531385,131072 /prefetch:22⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1864,i,1309024451443408620,14363211272949531385,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1864,i,1309024451443408620,14363211272949531385,131072 /prefetch:82⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1864,i,1309024451443408620,14363211272949531385,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1864,i,1309024451443408620,14363211272949531385,131072 /prefetch:12⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4768 --field-trial-handle=1864,i,1309024451443408620,14363211272949531385,131072 /prefetch:12⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1864,i,1309024451443408620,14363211272949531385,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3900 --field-trial-handle=1864,i,1309024451443408620,14363211272949531385,131072 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4708 --field-trial-handle=1864,i,1309024451443408620,14363211272949531385,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1376
-
C:\Windows\system32\sethc.exesethc.exe 2311⤵PID:1036
-
C:\Windows\system32\EaseOfAccessDialog.exe"C:\Windows\system32\EaseOfAccessDialog.exe" 2312⤵PID:3996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\475ced1c-ff29-445d-b87f-d5811d3f974c.tmp
Filesize6KB
MD518c2bc7fb09ce8b73fbda67b2165a798
SHA1d6760f88eef9e1099457f5e6cd368cfdefb74087
SHA2566ba7f91584bcb5d76f0cc355849c485753a1e135440ee4f143422af4b24f516e
SHA512874593940033e86fa235cd3b5a379b5f171c7625c88bd4bbe5bbffa82ac622dfc6c3d293cf81d9d7822d7829a2c9ef9ba36dfb4e45c6f7745132b99a37e3ff88
-
Filesize
72B
MD5f69147de0b9e9ab5a5d2b93b98bb432c
SHA1edc5e90ae07c243906712a24f118e7a9a8cbe392
SHA25664edfeec3a199ff9835f0cf9d944661471bed656f07d52d735e48c992e4faa1f
SHA512409a7e872d525f1d6660e9e133e2d1023979a491df91a58bbb8c78001c34d66518615057ffb542ed0fbc33d63ab56e91b85523d64f3c4ceba5773e2e7156f363
-
Filesize
1KB
MD5a8e3b7c521ed249ba7709c3ba970cde1
SHA17adc6a7a04df2f7c18a89036af05e1681169a8ea
SHA256508b54302b01089f233298b5cdef797ff93f331331f6ecb0fb2d2db76b69c7df
SHA512b592751f4113cb8d0c971f7afc78c01005dccb7875ccc8e749c9ac7399216436f1eb90eef09da291e0b7e23ad0172ee10be95b0ced28e89388b309d5ce477b8d
-
Filesize
1KB
MD5e3645616611c0217bcb2e405c2867b58
SHA1bc7ea13110056570444ef1e4478c8bdf0ed2e337
SHA2560b890eba5d850d4b986af45d6e906988d89f1ee38b0d8a892eee678e17697902
SHA512f3f9f11dee43c47cacb69b05bd1ecd18ccb15aed83e3a52a5f9eab5224a6c06c7ad79dbf4857e08dcce24acb13fafdab8dc555e6dad756e5174207d4c67a9ce1
-
Filesize
371B
MD5c35af3a6e0c77edf78f042c4da04ef0d
SHA13a13f4ab27eb43b4e2f71c40b891070848adc554
SHA256883f723ea87c97618ece288b5a15336ae51cb5766ae14ad287d256512154de3b
SHA51206d69ad97f77bc0328053489852bcb331a1cad3347531382d9f560a6fbf55ef463b669c1d6bdd67f4535867919f63913eadf3c197ada3f9209d4745512240484
-
Filesize
6KB
MD5eb576d1fea7d9fe06650bbe83a1299b2
SHA1865ae110160055603c00f3f39d1ab19d4243f3c4
SHA2560c53f2ca6f5f91f7a7fbcb9649bc5e10d0ab0cb94b7eac3fd5a65db74314d223
SHA512f349cd879d62d9fa00376cfd597982dc6be81c71170d0d25f8625e753ae1d380578329789fc59b80aaa747621a22daf55bca32376fe4782642333de466853d76
-
Filesize
6KB
MD5b7257c8058e7eeb8e63df076571eabe9
SHA1353e5a6d54acddaab0cf6ffd2c2c41d9e79c1f72
SHA256ecbbb366873107a42b1f1bdc26a78150fcb2ce22729d5928315e21b8d23a43ab
SHA512386287f41ca4fc8c1c4adb85a7a1c8014fde6a3e432daf2d8d1feb6308188a6745ff2e82dae9d111af648aac8e6a70d1ea6bd72f3a8dd4372cb646b1ba13f2d7
-
Filesize
6KB
MD5d899c52eb873a78079ce923253117a96
SHA185d1759a09b50ac96b4b0f22920fff8dc23b9e92
SHA25671881cb2e86c391eb97eb1eb864c50e7a7e8094daad39ab85385c11df499ee49
SHA51246d45136aac8fed6da5cf357b8e6db25d0d4578dbbbcb6afcc7f0c3788bd70575f0d99942f8f8a129823ea97c14f36dd223b35c073645687d1733fc4f33311eb
-
Filesize
87KB
MD5035b578f7a61858eeba9934685a5add0
SHA18a7b1f0b45191d9ce65ec60ce93a0ae5cb6ffda6
SHA25614e0cee92f3a4cc8e969d7d5939eaa24563007121d237533dabdd55ec4482edf
SHA51219eb9f39ab476cb39ebe25519ea856bace7b958144974ba362d804654ba98eb263dc2c061976699d5d6e85ddd484b82fd78a8e3a436450454c57c627b5fccdf8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd