Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 14:48
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gem.godaddy.com/signups/activate/MS0tc0lKWjlDOXZxYkxOWDRkWEpEdlVxcnpCNDVPUDlVQWN6dlFpOEFjZUxTQlYyVWNUSnp5VlZTdE8xeXZYR1A4b05iMjNuUVBtYjY2WnRnPT0tLUduQTFERUg4WHUxN3lSeFgtLTYwbXlLczlsK1lkSElMMDhPak1qeEE9PQ==?signup=6867859#bmFva28ueWFtYW1vdG9AbGVkY29yLmNvbQ==
Resource
win10v2004-20230831-en
General
-
Target
https://gem.godaddy.com/signups/activate/MS0tc0lKWjlDOXZxYkxOWDRkWEpEdlVxcnpCNDVPUDlVQWN6dlFpOEFjZUxTQlYyVWNUSnp5VlZTdE8xeXZYR1A4b05iMjNuUVBtYjY2WnRnPT0tLUduQTFERUg4WHUxN3lSeFgtLTYwbXlLczlsK1lkSElMMDhPak1qeEE9PQ==?signup=6867859#bmFva28ueWFtYW1vdG9AbGVkY29yLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3192 chrome.exe 3192 chrome.exe 4500 chrome.exe 4500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe Token: SeShutdownPrivilege 3192 chrome.exe Token: SeCreatePagefilePrivilege 3192 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe 3192 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3192 wrote to memory of 2856 3192 chrome.exe 34 PID 3192 wrote to memory of 2856 3192 chrome.exe 34 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 2844 3192 chrome.exe 85 PID 3192 wrote to memory of 4924 3192 chrome.exe 86 PID 3192 wrote to memory of 4924 3192 chrome.exe 86 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87 PID 3192 wrote to memory of 1532 3192 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gem.godaddy.com/signups/activate/MS0tc0lKWjlDOXZxYkxOWDRkWEpEdlVxcnpCNDVPUDlVQWN6dlFpOEFjZUxTQlYyVWNUSnp5VlZTdE8xeXZYR1A4b05iMjNuUVBtYjY2WnRnPT0tLUduQTFERUg4WHUxN3lSeFgtLTYwbXlLczlsK1lkSElMMDhPak1qeEE9PQ==?signup=6867859#bmFva28ueWFtYW1vdG9AbGVkY29yLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa6d29758,0x7fffa6d29768,0x7fffa6d297782⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:22⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:82⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3156 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:12⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4672 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4880 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:12⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4796 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:12⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:82⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3868 --field-trial-handle=1868,i,13696824431850489632,3105715101154684037,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5f12e760e34bd752188b450d5d0d3bf44
SHA1a50895bb2c140bcfa452e59d0c32adfbd9561984
SHA2564ea27803ea245fe0ed9ceaef9efcffcb94c1e7ecc4362dd6b9a611b4ac1d94d0
SHA5123e9940b3ef3a850f1d5adbc78852f9336fbab03508ba09e6cea5a06b7c45e9cff1274fe616bafc48d74029ed33b629160c5d482dbb790faa760ba23e5cc845e5
-
Filesize
2KB
MD5e6fd5bd082fca5fe6daf444976340bc8
SHA15a8a7657cb510301068a7fe94e158e14df4c0900
SHA25662a7dabe02575b739b11592407fffd545d577ee47ba612399d711c5346422505
SHA5127dd3d8203a3e63b4aeb27e702a4214ab660bfdaa28c91e08657ded9cfa3fd7a261b6be7cecc90728832b7afb2ee9eb1939e534c4ba2dcc08132c64cdf43ac98c
-
Filesize
1KB
MD5dad5196f5b37d97202851b2aa6a4a921
SHA1faeff4ea1f78aa401491e67dc3d065fc9af88d58
SHA256dce0043ba322a82eca0851b7b2a1fcc89ee659c7cc24b2f2e217a9fa42e2f4ab
SHA51255fd78cadd01484b283720630e045ca3d47fe66cf82b081193cd924573c2dcbf702b3900058fb3f998d49af9f4d5714364b95821a4c09fdee119511ce0b96767
-
Filesize
874B
MD569e59221da54dd7d0f2aa2fc72c2debe
SHA1d8706c293b2dadce37c744528cb19a0f64f508a0
SHA25663183ed25616ac1fcd1bb944c37248525d2172fa6a211720f624c1aaf4a5922e
SHA512135438d18443f163d335cdaf863e09e33162fb296841829411cc302807836c6abdb08a74a08a7c699868cc19d01dd23d0795f6c360e44142d963774ec5cd846a
-
Filesize
6KB
MD5c33009a396c00bfc86b0e9e1a6da2515
SHA1d07259511fce8a34cecc56d7a14c6958399d9261
SHA2563a5a8a7becebd0542989b93d642ccf37920bb6fa4bc283b41a72b1fa222ef268
SHA512798c88dd75252c60b10396e8b73cf344c91ea41143814bbad8e2d983922104afee0d455695df87c160a7ed90c8d33ead97235f60a4cf3e7b1c5cd0976a88c23b
-
Filesize
97KB
MD501f9feaab04a1ebaee7229306d9ae3a3
SHA1bb7729f7711672c16472b9470d4740bae14678c7
SHA2566d7811324c59a1ffd68d3a14aae065da8d2ec05f3935a92046966c81ab7007b7
SHA512a05886fbf32977c77285f2e202505dc847882f5d8c86c8daacf16a1e9185971fcc621189c65a654021e50c6abe1897d6904eda56f489709cbfc916ef973b1653
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd