Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/08/2023, 06:34
230826-hbvllsae2w 126/08/2023, 06:33
230826-hblnpsae2v 126/08/2023, 06:11
230826-gxxgnagf62 126/08/2023, 05:46
230826-ggexnsad41 126/08/2023, 05:36
230826-gawa3sge98 126/08/2023, 05:27
230826-f5eq5sad2v 1Analysis
-
max time kernel
27s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 06:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://0kxvv.mjt.lu/lnk/CAAABA254gcAAAAAAAAAALMf3T4AAYCsEZgAAAAAACHN5ABkUOOLCGnV-r3DRBueDA-xSegS1QAfv6g/1/EQ8sQrAgVxiNoiCJdN1azQ/aHR0cHM6Ly9lMjAuYXBwLmxpbmsvZm9ybT8kZGVlcGxpbmtfcGF0aD1vcGVuJTJGZm9ybSUzRmMlM0Q1YWU1YzllY2EyYmIwMTQ2MzJjNWY2YWMlMjZmJTNESW85R0dQM0E5OFhuSjdnTUdYcG8lMjZzJTNEUlk4TVFKWWRWYno5YjBoWGNiaUM
Resource
win10v2004-20230703-en
General
-
Target
https://0kxvv.mjt.lu/lnk/CAAABA254gcAAAAAAAAAALMf3T4AAYCsEZgAAAAAACHN5ABkUOOLCGnV-r3DRBueDA-xSegS1QAfv6g/1/EQ8sQrAgVxiNoiCJdN1azQ/aHR0cHM6Ly9lMjAuYXBwLmxpbmsvZm9ybT8kZGVlcGxpbmtfcGF0aD1vcGVuJTJGZm9ybSUzRmMlM0Q1YWU1YzllY2EyYmIwMTQ2MzJjNWY2YWMlMjZmJTNESW85R0dQM0E5OFhuSjdnTUdYcG8lMjZzJTNEUlk4TVFKWWRWYno5YjBoWGNiaUM
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133375039193533446" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1288 chrome.exe 1288 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe Token: SeShutdownPrivilege 1288 chrome.exe Token: SeCreatePagefilePrivilege 1288 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe 1288 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2680 1288 chrome.exe 81 PID 1288 wrote to memory of 2680 1288 chrome.exe 81 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 2936 1288 chrome.exe 87 PID 1288 wrote to memory of 4912 1288 chrome.exe 83 PID 1288 wrote to memory of 4912 1288 chrome.exe 83 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84 PID 1288 wrote to memory of 3556 1288 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://0kxvv.mjt.lu/lnk/CAAABA254gcAAAAAAAAAALMf3T4AAYCsEZgAAAAAACHN5ABkUOOLCGnV-r3DRBueDA-xSegS1QAfv6g/1/EQ8sQrAgVxiNoiCJdN1azQ/aHR0cHM6Ly9lMjAuYXBwLmxpbmsvZm9ybT8kZGVlcGxpbmtfcGF0aD1vcGVuJTJGZm9ybSUzRmMlM0Q1YWU1YzllY2EyYmIwMTQ2MzJjNWY2YWMlMjZmJTNESW85R0dQM0E5OFhuSjdnTUdYcG8lMjZzJTNEUlk4TVFKWWRWYno5YjBoWGNiaUM1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc04fc9758,0x7ffc04fc9768,0x7ffc04fc97782⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1888,i,10397009306602381713,12365134788034595786,131072 /prefetch:82⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1888,i,10397009306602381713,12365134788034595786,131072 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1888,i,10397009306602381713,12365134788034595786,131072 /prefetch:12⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1888,i,10397009306602381713,12365134788034595786,131072 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1888,i,10397009306602381713,12365134788034595786,131072 /prefetch:22⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4684 --field-trial-handle=1888,i,10397009306602381713,12365134788034595786,131072 /prefetch:12⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1888,i,10397009306602381713,12365134788034595786,131072 /prefetch:82⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1888,i,10397009306602381713,12365134788034595786,131072 /prefetch:82⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3660
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5afc0ade3348555ca7772ccffc699d512
SHA11c24e59071ab4dc7d75e4ae3f32d9d17e63223fd
SHA2561a3f1a3b76b372005a43b8c9982f9e41b03477f8e3605e9552c896b9e711d744
SHA5128fb88b99cd81f38ab6f58f0df7b99ac6973ed6996214fff7381fedb124723e8f112a05697eecdaa51be241429b9e7462a0c2168c14c0a8e80f23030b22a50822
-
Filesize
1KB
MD5f8e0b45b09ffd4e9516cd201b983a9af
SHA190ed06e6ac837bd467e9bf7bfaa2077be3c25019
SHA2568862c5b35c292c9246e08d59623ade835fe77e5c2e9905edad19c35aae22f683
SHA5128cbdb981c77c6d9f03cfa2bd58ea44f53c8d89b7a55c7b7c1859fd3e92b2b6e60e70429c519c532592be52a4bdf54863512bc0e1d6fd38ee92fdc435dc3a664d
-
Filesize
6KB
MD5c5c29f93d986fa6cafb364d535f013bf
SHA1278b28f5633692c02bd3579b8829e976319ba4cc
SHA2564dedfd08f4ee36c075c2e5cc6885f29416c0c309fe3d8ede26a7e95799082e89
SHA51258406c12f9abc6f22b83cf4ece7a9d8a620d86b74f5d43e859993a40d13b82be15ea3ac32da02689a361696b229ade69f5d6c78d55fffab46329d6b5a00c0db5
-
Filesize
87KB
MD50d7201b25e358f09e709efad3bbf03d0
SHA1bffcbd7ef8edc4fe75dcd000d3ab2b496ee6c581
SHA256a379788491377cbaf0715a2ec1bb4f3df1684da2ecee0687b7a0656969beedf0
SHA51290d22acc95fbc5b533e8ff085dc46bb07a01292db6d242273cb2db50c5bede09b63571b7a8090577290861da152dfe5e3689d38ad08b5d8952466747d42b88d4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd