Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 09:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ailing-comfortableness-57ffca0af01f.herokuapp.com/+?y=49ii4eh26oq68cr6c4q3acpkc9gjgp9g60o32dj5c8qj8op2
Resource
win10v2004-20230703-en
General
-
Target
https://ailing-comfortableness-57ffca0af01f.herokuapp.com/+?y=49ii4eh26oq68cr6c4q3acpkc9gjgp9g60o32dj5c8qj8op2
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133369096990707227" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1836 chrome.exe 1836 chrome.exe 4384 chrome.exe 4384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1836 chrome.exe 1836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe Token: SeShutdownPrivilege 1836 chrome.exe Token: SeCreatePagefilePrivilege 1836 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe 1836 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1188 1836 chrome.exe 82 PID 1836 wrote to memory of 1188 1836 chrome.exe 82 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 4988 1836 chrome.exe 85 PID 1836 wrote to memory of 1008 1836 chrome.exe 84 PID 1836 wrote to memory of 1008 1836 chrome.exe 84 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86 PID 1836 wrote to memory of 4844 1836 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ailing-comfortableness-57ffca0af01f.herokuapp.com/+?y=49ii4eh26oq68cr6c4q3acpkc9gjgp9g60o32dj5c8qj8op21⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a95c9758,0x7ff8a95c9768,0x7ff8a95c97782⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=408 --field-trial-handle=1960,i,979170814814912437,4835121493545863197,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1960,i,979170814814912437,4835121493545863197,131072 /prefetch:22⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1960,i,979170814814912437,4835121493545863197,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1960,i,979170814814912437,4835121493545863197,131072 /prefetch:12⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1960,i,979170814814912437,4835121493545863197,131072 /prefetch:12⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1960,i,979170814814912437,4835121493545863197,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1960,i,979170814814912437,4835121493545863197,131072 /prefetch:82⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 --field-trial-handle=1960,i,979170814814912437,4835121493545863197,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4976
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5db8d8102b2382f6872330358085192a1
SHA1f111a55aea9161ca14e1b8544d75b4b7a4951efb
SHA256865d7c34fcd610f66ae139f71182e94526ff8f36cfce37cf32f523a1e3aab5a4
SHA5123703debeac0c0987aa2ba5a8bcad29a33c00a5115f273cc1609dffd4f2898f84b3d7ba1a044735a073b81b734724006cb11889e34946388fd1216a6f8a185642
-
Filesize
6KB
MD5e61a52325ee147c6694dd91b36f34a3f
SHA182a3f1d3868028a8e0c337e2f6a0b7653def879f
SHA256b495f90c36e7691d7208e3a460ffca45c64c6baddd34ba7e0cb37a522dd12722
SHA512cfc75a6a8bd3d4d9cef0877de26224258377ddf8a74e53fe249f5b32557a61735ac7da095ce4632943075c7006b28ba5b12a452f6b039a159a39fe4f83b1699c
-
Filesize
87KB
MD542d8d07f59a40a2186b2136a34c0b7f7
SHA17449add86ac4ef3d1e12f27df22f06acb555c8b6
SHA25665f66c5a64b0b843366964f79a16c44e52127bc5d2fbc3fc6250adbcd9e7b881
SHA5129dc4a726594741de13b9fbecfb48fc10a905bb464e184b3f28c145219ef92eefc96e67d59357d2d246b74f71eda37bfa848378088efa080317fa18b52e5cff5b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd