Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 02:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://thermohydrometric-switch-ba2c20dbfb96.herokuapp.com/+?y=49ii4eh26oq64o9nc4r64p9k6ph36e9g60o32c1g68sjcoh2
Resource
win10v2004-20230703-en
General
-
Target
https://thermohydrometric-switch-ba2c20dbfb96.herokuapp.com/+?y=49ii4eh26oq64o9nc4r64p9k6ph36e9g60o32c1g68sjcoh2
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133355885658954582" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1084 chrome.exe 1084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 3136 1084 chrome.exe 80 PID 1084 wrote to memory of 3136 1084 chrome.exe 80 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 1644 1084 chrome.exe 82 PID 1084 wrote to memory of 2608 1084 chrome.exe 83 PID 1084 wrote to memory of 2608 1084 chrome.exe 83 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84 PID 1084 wrote to memory of 4940 1084 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://thermohydrometric-switch-ba2c20dbfb96.herokuapp.com/+?y=49ii4eh26oq64o9nc4r64p9k6ph36e9g60o32c1g68sjcoh21⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6be99758,0x7ffc6be99768,0x7ffc6be997782⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1876,i,5595360671952801778,12013194984662176381,131072 /prefetch:22⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1876,i,5595360671952801778,12013194984662176381,131072 /prefetch:82⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1876,i,5595360671952801778,12013194984662176381,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1876,i,5595360671952801778,12013194984662176381,131072 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3132 --field-trial-handle=1876,i,5595360671952801778,12013194984662176381,131072 /prefetch:12⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4912 --field-trial-handle=1876,i,5595360671952801778,12013194984662176381,131072 /prefetch:12⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1876,i,5595360671952801778,12013194984662176381,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1876,i,5595360671952801778,12013194984662176381,131072 /prefetch:82⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3272
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
537B
MD527ab91ee4f6a5f909c989b049d6a0858
SHA14d5265701c8a605b4d7a4f46014b8fff92377e9d
SHA25644db587274159662365b221b3e85297284471fe23bb258857039c8a3aa9b811e
SHA51229275fccd034bb2d3206e04d28e78636bf91210362b91c559cb6cc127c70681987fbf0b3c663f00b34e0dd6f42358f74567a228ca514b0547925dff0160fca25
-
Filesize
6KB
MD5d3e5070e86ef109093b1c699b3d1f8f8
SHA18a200a8e06acb955aac413a5dacdcd683410933b
SHA256c7997c4371ec13a60faac40811f39bf68e1b7138129e16e1647c8a072aa15a36
SHA512d6e4ded38586ad040b09d56bd336ea8d9c684543566f2d68ce4ec0b8d4172d42610bb39362bc38f755b1e78b1a7921301e59d025fad83b0a063d737359ecf2c3
-
Filesize
87KB
MD5d5d22cd120405cb36ac9caa903de610f
SHA1ccd7127e192f9954187e56b97385c25843697eea
SHA2561b30d22122d26bafc120618d22861c237af27e48ecd348acbccdb100026bc7ef
SHA5125b3e43993da9ab1237ec6c8ccb0749bb044536569bb487d00b5b22a6c5c24759fdab92b4fc75c3156f7e86f2929056717ce79b641d68604f7a669914ac4c8417
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd