Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
86s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 23:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.yesware.com/tt/745049c77cf3cc37ffaf320f651a53a6686ba130/3b183871027430cdfabeb460e0ab644f/64e9f37efc40139e4af22d29fc86a23b/calendly.com/universityadvisors/tfpc
Resource
win10v2004-20230703-en
General
-
Target
https://t.yesware.com/tt/745049c77cf3cc37ffaf320f651a53a6686ba130/3b183871027430cdfabeb460e0ab644f/64e9f37efc40139e4af22d29fc86a23b/calendly.com/universityadvisors/tfpc
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133366165566914063" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4328 chrome.exe 4328 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe Token: SeShutdownPrivilege 4328 chrome.exe Token: SeCreatePagefilePrivilege 4328 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe 4328 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4328 wrote to memory of 536 4328 chrome.exe 82 PID 4328 wrote to memory of 536 4328 chrome.exe 82 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 3436 4328 chrome.exe 85 PID 4328 wrote to memory of 4860 4328 chrome.exe 84 PID 4328 wrote to memory of 4860 4328 chrome.exe 84 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86 PID 4328 wrote to memory of 3740 4328 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.yesware.com/tt/745049c77cf3cc37ffaf320f651a53a6686ba130/3b183871027430cdfabeb460e0ab644f/64e9f37efc40139e4af22d29fc86a23b/calendly.com/universityadvisors/tfpc1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff940699758,0x7ff940699768,0x7ff9406997782⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1880 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:22⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:82⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:12⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:12⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4824 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3372 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:12⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5084 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:12⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5236 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:12⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:82⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 --field-trial-handle=1976,i,6330384435130499174,2919855881778631765,131072 /prefetch:82⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1264
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52a9c0a1074358185eeb6b70954ebdfe9
SHA1c944e4dc2d1c703937ba0c9ada25927bb3373983
SHA2564dadc11ec68efc62c2ec5fdddca582d3f3bc413b85351b5d3d7285cf8d2f0cd4
SHA51229c9d5895fcbdcb5999a40a5068d378b86c50a2ccda983049dcf5b9a184fb2d1162fa0a7225f1a6ae07b993fa4d251f6aefe5df008c055fe1c2fc859c135b339
-
Filesize
1KB
MD5d373a322f9fd9fe9a0f1540caf7facc1
SHA1057fd60fdbf05908f314bc6c8e64f400d4f19c7c
SHA2569cb4715d1ba73686fcbd625f45336ae540f4b07fae4d50e268bc6cd878ff1d90
SHA512e57600e035adff3198965ed89b8985a11e62441095458bc11cc8901ea2bca66491466486703cd91d5fbea872580686dee9a5079e9208c7f03198211d5855ff8d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\0e081252-8de9-48fa-974e-9340265a2ade.tmp
Filesize3KB
MD5f02fa270fa338990b21a3d08655f1ce4
SHA1af5272588e1b6442bc62c1a373eb4d19399622c5
SHA2561a641e7dd1bd25006c7619cc168193457841a8c524c23b850602c542d46aef12
SHA51282ccc0885fd68c47fe83acec3aba68158b345645dd7db5697faf8e29709fd41dd677e0208151b9a9161544450ea094935707c776cf3e4042aaa62701e6e2c395
-
Filesize
2KB
MD5024f692fecc7505cd4989ee3252cec9a
SHA1ce60b9643e61870db6ce8d8ac91e478219e6bd81
SHA2562198c2a4b3506046470c20848e91fc304e38d9f316239af35e079d8d1eda1c34
SHA51276e2cd36b0ce9640d554377a579cb557c6f3f75aa2a1cc9a36f4473f883bf360c79dafe20127fca9cd922e1ce877f9cdc845a82a29e23072a5221750f3e9c283
-
Filesize
3KB
MD5a0d5b9df28eba60b4ca81e04e9eaa65b
SHA1c9c1883bf7b6bba134d94b2bdba2df73ad7fa407
SHA25640506addf18fc03dee2e477582951a399eb5bcaf380dd53ef7c72317a71bfc5e
SHA5124b2dc2d06baf8f2c64dbaddf2fdf07a402a36358f61f749371d0da0dcf9a2b41b5496f6cd57faee77b24796f8b4d50f936b1474d02208f894fcb57bd7f8bd10f
-
Filesize
3KB
MD5158297c69eb3205683b5517a69b3bea5
SHA1cd44eef10e47d41fe849ac938358bf8db753443b
SHA2562c77ea44b549faafcfc0facf913f584348f9942aafbf2a96b199b3977681c656
SHA51219918fbc0794503b2b7c3761ef7594340b9704428a6e43eca6511bfc2e3b38a1ebf196297c635f912cc033cf16ab3484414105dfd4337e0ec50fa1fcfb9c92c4
-
Filesize
6KB
MD55f207cff7d2403451ab20eb8b1d5a90a
SHA1bcafa56e8e9a4f15d3b036a6eee80a7259938390
SHA2565aa0a090fc3567ab0a281b80335c9bfa47858795f182261caf2d320fbf1b5d01
SHA5123faa1eb393a0242973bc0f3b0e2821c11a406a1acb9f8fd25671ebc0061c3103a02a0cbbf5a7a859d1e7266d5ecdc5fd6d5b34d45efeae26b4e76654e3d2688b
-
Filesize
7KB
MD500b4798425bf6106e68f8e5cd3f4621d
SHA1c2dd47eb58c6a5e3eee0ede07429d4499e5eba59
SHA25611241a1f29a82db54af0a7bd93bd7b8742a943ce039ec7683dade33c79a17b62
SHA51224d037fcd3bbadc764326f9a9c81fa371f034288ecd93fcc215d8e162fe6ac3ee3605efff06c4a7a39a7f5b8dacc77cddb20cc7871ffc6f0faa31239e258a09c
-
Filesize
87KB
MD5f80bf3c5ae24706cd61ce7f6fcb2df13
SHA1409f9bfa694c7eb949f19d194237ce702b4e72f9
SHA2568d848f1bec0dd12d9cfa0e287f78356ca136fc5f00a881f5826cccb5a410ccf5
SHA512ee6242117b2da1848231c12da2b3fb7c60fb58b358a534e393dbe46454724d76c6ce4bc98523e97cb551f49d88a308c83bd47cdd16399be160923773bcdab5e3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd