Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 22:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://wellnesswalkway.com/fwd/P2Q9OTIzODgmZWk9MTIzNzk3NTImaWY9ODMxNiZsaT0xODEy
Resource
win10v2004-20230703-en
General
-
Target
http://wellnesswalkway.com/fwd/P2Q9OTIzODgmZWk9MTIzNzk3NTImaWY9ODMxNiZsaT0xODEy
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133354885043333248" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 888 chrome.exe 888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 888 chrome.exe 888 chrome.exe 888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeCreatePagefilePrivilege 888 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 888 wrote to memory of 4008 888 chrome.exe 62 PID 888 wrote to memory of 4008 888 chrome.exe 62 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 4036 888 chrome.exe 88 PID 888 wrote to memory of 2056 888 chrome.exe 89 PID 888 wrote to memory of 2056 888 chrome.exe 89 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90 PID 888 wrote to memory of 4460 888 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://wellnesswalkway.com/fwd/P2Q9OTIzODgmZWk9MTIzNzk3NTImaWY9ODMxNiZsaT0xODEy1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc99d49758,0x7ffc99d49768,0x7ffc99d497782⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1864,i,2602690349945131001,8849394246554105910,131072 /prefetch:22⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1864,i,2602690349945131001,8849394246554105910,131072 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1864,i,2602690349945131001,8849394246554105910,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1864,i,2602690349945131001,8849394246554105910,131072 /prefetch:12⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1864,i,2602690349945131001,8849394246554105910,131072 /prefetch:12⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3968 --field-trial-handle=1864,i,2602690349945131001,8849394246554105910,131072 /prefetch:12⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1864,i,2602690349945131001,8849394246554105910,131072 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1864,i,2602690349945131001,8849394246554105910,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4156
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD5d30cb1bca73d0a4fc77134d101b91248
SHA1d217a4e6ffbd67f800383bf26741c3811479bef5
SHA2568b9821927ba718222d2c93cc1c3844d3002359235ef971482a951cba24cdf5e5
SHA512df01e08e028d1ec02e735c4322faa9d444f3489e3e18316d8fec55a3d31668405c3ee4c7313b1067770e26dcbeb88f08ad5599a24cb663d9dc035bd8a9129249
-
Filesize
6KB
MD5f881f818a62857ff17303b4ac8d84369
SHA1d731a16af4e43f85f10f3337ddd3e3f3cb47d335
SHA256ae7d509f08a62208c702e85576f8efaa85284a39b8a274307d9524fa2ea2c50c
SHA51250f34ed7f6ef982715ec8987ee80c777afcdbb4c7d2f083432201dd185edeb0d76e3ea76eac4e8a67ce5f1c175ddf1682daf133c91589f4eeadd4fb17334587e
-
Filesize
87KB
MD503f8bf932f5c65149637bedaff531c5b
SHA15aeaf59042a0d29721acb92b71376db95f7fc565
SHA2569755c7525a9e0eaf87502bbe32b13b98bf6ea4d05403217c7b0959399c12f4b4
SHA512e3ebf584acab1927c9cf4d379d806d8a6cf4eb6e10668e69020e7556fae5e7f3b9ee4ac17944d0c16a2f65aee1d36aeb8d2600914a03d13ab64fff2af467892f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd