Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 08:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ema.doox.cloud/campaigns/dj991hqfgka85/track-url/pc843q43ycd32/36d858c4b909942a3b5a59282a33523447b7e151
Resource
win10v2004-20230703-en
General
-
Target
https://ema.doox.cloud/campaigns/dj991hqfgka85/track-url/pc843q43ycd32/36d858c4b909942a3b5a59282a33523447b7e151
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133372519258391660" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe Token: SeShutdownPrivilege 3600 chrome.exe Token: SeCreatePagefilePrivilege 3600 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe 3600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3600 wrote to memory of 860 3600 chrome.exe 23 PID 3600 wrote to memory of 860 3600 chrome.exe 23 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 4104 3600 chrome.exe 84 PID 3600 wrote to memory of 3324 3600 chrome.exe 86 PID 3600 wrote to memory of 3324 3600 chrome.exe 86 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85 PID 3600 wrote to memory of 4296 3600 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ema.doox.cloud/campaigns/dj991hqfgka85/track-url/pc843q43ycd32/36d858c4b909942a3b5a59282a33523447b7e1511⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xd8,0xdc,0x7ffdd4f09758,0x7ffdd4f09768,0x7ffdd4f097782⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1860,i,4057417297081915945,11284527305792353441,131072 /prefetch:22⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1860,i,4057417297081915945,11284527305792353441,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1860,i,4057417297081915945,11284527305792353441,131072 /prefetch:82⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1860,i,4057417297081915945,11284527305792353441,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1860,i,4057417297081915945,11284527305792353441,131072 /prefetch:12⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1860,i,4057417297081915945,11284527305792353441,131072 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1860,i,4057417297081915945,11284527305792353441,131072 /prefetch:82⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4600 --field-trial-handle=1860,i,4057417297081915945,11284527305792353441,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4644
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD514b527db558d010d87d062a42844f262
SHA1ca26dd1f3dfba355b12573393f827f746ca068e7
SHA256bd5f47cb13bf76b6bfce7a37de959eed46b12a3ec398d86446ef1943141a4587
SHA512dee17db7d7f8cba709dec6cf41b53b3aa6de6a2447f0acba136d5ee93cbb92f8c334eddeb5c2cbe5e56e316c83dc5f85beec69d184aeefad2cf0cc66fc20d47c
-
Filesize
1KB
MD5d69be11ffc7d8467c15ee0c7e3a2ea90
SHA11f4bb962ee5bdc96f234dc39caae18f63c9a254e
SHA2566df54e5144e33616a64b5548dfe2f073955e37139305a1716eadf7f30519f365
SHA51293a62f0eb94a7deeef912ca5d2e838cfbed7c32a36d5fa563f3f98351fe2352e38bdb2e1561d7d03906745cecbf415cc879ecc5e9c0ddb120eafc2759bbcfbaf
-
Filesize
6KB
MD5c47c783edaf568ac783efdddb50346ec
SHA1137a9ad800924aeac4559beb414eb77b7c802704
SHA256d9fde05d3d4d7eedc6d9a2f573eb018be9092b3dc033d0a1c633d74688a57a11
SHA512b1a87aba110ea1b97c6aaf07695033dd62be105afbc9d84418107fd9108af30ec84de579de174b423d13b763f12030a0e28eab07cf201951266f8cf91d3e5d37
-
Filesize
87KB
MD5787664e7bb9a42ff8b95a8b66ad9d229
SHA16d469fcc016bdad33291cb8bf1980c5fc80dec7f
SHA256d63559b77c4662e9813670882e4123bd8dcc0cef8796d4acdcc2acc3c4bf2958
SHA51296b942a52f8cd5105ea93890cc184cda29731c4f1396b12ed8898f39df4c04813dfde94c2c047c75da9be5eea76d1cd07cfa780166049c1afe0333df3546fd38
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd