Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1199s -
max time network
1158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 18:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mondo.file.force.com/servlet/servlet.EmailAttachmentDownload?q=4fo5i6CnbxUERGdlcMGGDkhjLVTbrR6fGwEVunFKfeP%2FkO1goMxlVVJBB%2BAuHbbwynAqoQMiG9a%2BSpAysYq78A%3D%3D
Resource
win10v2004-20230703-en
General
-
Target
https://mondo.file.force.com/servlet/servlet.EmailAttachmentDownload?q=4fo5i6CnbxUERGdlcMGGDkhjLVTbrR6fGwEVunFKfeP%2FkO1goMxlVVJBB%2BAuHbbwynAqoQMiG9a%2BSpAysYq78A%3D%3D
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133366837921652034" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 1060 chrome.exe 1060 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 3396 396 chrome.exe 81 PID 396 wrote to memory of 3396 396 chrome.exe 81 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4712 396 chrome.exe 83 PID 396 wrote to memory of 4636 396 chrome.exe 84 PID 396 wrote to memory of 4636 396 chrome.exe 84 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85 PID 396 wrote to memory of 2384 396 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mondo.file.force.com/servlet/servlet.EmailAttachmentDownload?q=4fo5i6CnbxUERGdlcMGGDkhjLVTbrR6fGwEVunFKfeP%2FkO1goMxlVVJBB%2BAuHbbwynAqoQMiG9a%2BSpAysYq78A%3D%3D1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5a199758,0x7ffd5a199768,0x7ffd5a1997782⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:22⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3220 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:12⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4636 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4788 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:82⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3980 --field-trial-handle=1908,i,8556615910712589457,6512623912134377748,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3124
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5b8d1766440f24b8085bd8696c2447dc6
SHA1198b39a7e46fb467c2ed18207e06195b697a279e
SHA256a563175c9fb2065671d7d37a730db6b2718437dea91bcd59acedc835d37e1737
SHA512a0ed43cc7b59a45acc574059e0b8cd0214ec0719dc9b0c07981a21da4d931dcf58dd4cee65ff155d32c02a0edab8527800f5754ad93f3cbaad5381e602d722f5
-
Filesize
538B
MD5f3cd81b22d4c65da4db6b5abe26f4935
SHA14d36467a7f4da0deb86d2a6078c9322b016e8d51
SHA25645cb1e476d0adaeabd4dbdb6f85f0ed0da3e16b7ebdd6a197d2a93f968f321ac
SHA51263713a740dc0c261755d8775bebf8a0b07aedc4ef32b89a8c0a13d4443bf52365c95f14dd424d1f618f510bceb1a2119c5d0fff89263cb8d2b7ff5e545642b34
-
Filesize
6KB
MD5527bfab3aae65e885868f8ffc485cf34
SHA1b4f91fa122545c3842a08aa68f0af094c30a3589
SHA256239fe93d54658febda936c50dfef138298b83bc7eb0f17f8b0277565b45c6f1b
SHA51273a79984bf9f1a3dccdc247f7070e457a21bf2203afbe6602bb44175b5886b51cfcb1ecdde497a846250f6bb90c983a9a73c3231d058746bfcf32ccc311ab55c
-
Filesize
108KB
MD5771226e4774c2faabd458fbe84521972
SHA1899fa5a935f76c35946f929134b072c90bd8e6c5
SHA2563ab9f3a2adf0c08ae0212b49c222b21ff80784d5bdf95568ef371400bc0b2a11
SHA512a67bc5c4f904015c5cd03338408df43a5e16c9c4e55a20b55afdd3669868ec2267c2b511454971344752641bba23e916d4ef443735f33f5cb59f252fe0e0579b
-
Filesize
89KB
MD57e1e76499e10b1b7854686f930a71107
SHA1742b394302c84ba20d7fea729897b81793e9bf51
SHA2562205fc5f8e8e202062f69564d2cd0533b4ffc42e1018746a9039fb74961b4eef
SHA5120177de0818aa28d6237714d809226c936c49a14e5b83fcd2383bfc1f8bc43bc27f6cafd33a9d3c0a07f8b079630513d777ba97eb2b3d0802704dc81bfafcb457
-
Filesize
89KB
MD5bef9bc01692abb6a9ec4ef9ec75359d1
SHA16983df245c95ca1172e9e379e07a6aa001e3eb4a
SHA256698f8401fae93888d92eb785ce06c49c96a47ee02ef6e6624b8bfa79c16702de
SHA5123ef544bbed03406c81a67a6bd93770d48e053c6e998c78b7445971a4a55b24847e9de127819a44c1f0cb67a9e419bbcf91ca5944c4583d078bff000af2bf459a
-
Filesize
89KB
MD563a2b67e1444acf27d4ecb9516f1f5c3
SHA180388c5ee65aac67e4cce996853a5a4feef87b5e
SHA25617debaa95f656dead5bcb30e1711a758b6e9bb3494807550a6c7055e6c337f7d
SHA5122fb78e2ee3bf99e231e6b2533691d8b16ec065b373dfab3eb8b01233ffc4d417f888a57773a86d2a0add19bae7769325b245fc0426f4c0606490ca282c8f24cf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd