Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 16:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cdn.otomotoklik.pl/static/WAUZZZ8U4JR068370/vc/exterior-closed_nr_001_small.jpg
Resource
win10v2004-20230703-en
General
-
Target
http://cdn.otomotoklik.pl/static/WAUZZZ8U4JR068370/vc/exterior-closed_nr_001_small.jpg
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133365898707447070" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3132 chrome.exe 3132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe Token: SeShutdownPrivilege 3680 chrome.exe Token: SeCreatePagefilePrivilege 3680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4856 3680 chrome.exe 81 PID 3680 wrote to memory of 4856 3680 chrome.exe 81 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2980 3680 chrome.exe 83 PID 3680 wrote to memory of 2644 3680 chrome.exe 84 PID 3680 wrote to memory of 2644 3680 chrome.exe 84 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85 PID 3680 wrote to memory of 4052 3680 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://cdn.otomotoklik.pl/static/WAUZZZ8U4JR068370/vc/exterior-closed_nr_001_small.jpg1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7fff1c769758,0x7fff1c769768,0x7fff1c7697782⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1888,i,15865146739006213541,16806012706798771933,131072 /prefetch:22⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1888,i,15865146739006213541,16806012706798771933,131072 /prefetch:82⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1888,i,15865146739006213541,16806012706798771933,131072 /prefetch:82⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1888,i,15865146739006213541,16806012706798771933,131072 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1888,i,15865146739006213541,16806012706798771933,131072 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4348 --field-trial-handle=1888,i,15865146739006213541,16806012706798771933,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4476 --field-trial-handle=1888,i,15865146739006213541,16806012706798771933,131072 /prefetch:82⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4352 --field-trial-handle=1888,i,15865146739006213541,16806012706798771933,131072 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2740 --field-trial-handle=1888,i,15865146739006213541,16806012706798771933,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1096
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704B
MD588e5bdf37c619ee04a8b0df6218f2c1e
SHA11b12dc33950cf46a7b2a376ecd44101b7fba963e
SHA2568a3ac27d0d3f13bae798229fd7730e4b2d9551b00f53eb6a0e9d19338e85c32b
SHA5124f4e65d4f9bcf4f5444df0f41e63b31771460b7087790911b837f81f41a4d56221c98bc473d312bef2366bb55078d5b1ecf29c1624a743dc5edd5b9c384849e4
-
Filesize
6KB
MD5bd3958977f5b04df9ccdd06c9c89bace
SHA1a46d02a7382e1a0038ae7f5785796ced7f909868
SHA256a1078ced2dfbd3206c0ef069f88d1b8a51df74ba4da3c633cea96c3d3faa5bc6
SHA51290a9f5cb69a90e822dc190ebb90eb701f97f15c03107c859c4a4b0976aa2704c546d68bd0a5fb9021f22907b70b1f89de2f1297b98314bbbcc284274e590fe26
-
Filesize
6KB
MD52eb4e74d75bbba256cb80179ab0617ea
SHA184aebc2ef90a5ef0049768efcb043a26bb36fdb7
SHA256938739d777b89c9da5f70c61f7cdb78684450488732f6d1609f510b34db08871
SHA51272fe0d1aa3543c7d8fe7daeba61fd9a8f8053a183b3c4bd621eece9fb4099585b5395681fe35d4cea98f419255be91b0bab8499e88886aba2450c9eb75c87300
-
Filesize
87KB
MD5f0393e11ebba2c8a7e65ee8351bd67f6
SHA191d9f6ef027167ef1e083c04f4643ef8df1f7b12
SHA256825bdb38ec6cb0a3339513e8b7e65037a6ee899a422537e90bf28740241ccc9f
SHA5121e5f1bf302f9040e9793fee1e4449f2b0b3f06ed0d7a509cf43d739e0ec37d4e285c43bb6555a9279b5851f396c53dd4b3eff149ffc5d4d9e16f30e96ca87894
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd