Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1799s -
max time network
1764s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
21/09/2023, 14:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://m.hblw.de/inc/rdr.php?r=4589252c481c1137c199c
Resource
win10-20230915-en
General
-
Target
https://m.hblw.de/inc/rdr.php?r=4589252c481c1137c199c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133397807106055183" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4228 chrome.exe 4228 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 3912 4760 chrome.exe 70 PID 4760 wrote to memory of 3912 4760 chrome.exe 70 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 4056 4760 chrome.exe 72 PID 4760 wrote to memory of 96 4760 chrome.exe 74 PID 4760 wrote to memory of 96 4760 chrome.exe 74 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73 PID 4760 wrote to memory of 1504 4760 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://m.hblw.de/inc/rdr.php?r=4589252c481c1137c199c1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbb84e9758,0x7ffbb84e9768,0x7ffbb84e97782⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1820,i,8357438736548526559,8769078785368308268,131072 /prefetch:22⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2052 --field-trial-handle=1820,i,8357438736548526559,8769078785368308268,131072 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1760 --field-trial-handle=1820,i,8357438736548526559,8769078785368308268,131072 /prefetch:82⤵PID:96
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1820,i,8357438736548526559,8769078785368308268,131072 /prefetch:12⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2912 --field-trial-handle=1820,i,8357438736548526559,8769078785368308268,131072 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4636 --field-trial-handle=1820,i,8357438736548526559,8769078785368308268,131072 /prefetch:12⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2596 --field-trial-handle=1820,i,8357438736548526559,8769078785368308268,131072 /prefetch:82⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1820,i,8357438736548526559,8769078785368308268,131072 /prefetch:82⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1820,i,8357438736548526559,8769078785368308268,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5637e1571262153c1dd3c77e84d429e2e
SHA18c6f3ca7174ca11739bcd7e8c50a65dc4c2ce3da
SHA2561080fd12da37a02de6256059cc1f4e380f1ee5f280eb2c9924cda61c029aa0ba
SHA51208247d0085403cc8e913c38d0eef0522fa1999988765dd96569bad8a5dc654ae655caa322bdb4f5d149ef502e0367d7e528d7c403ccac24c260f16e8bc0dbab9
-
Filesize
4KB
MD538d105fb22d2020437603716f2f9c12f
SHA1bc5cdf2077d96cf645385006342a676cfc4f267e
SHA256166923f3d79d89caa26b47b270d63221810fc37557617dd96af017c5738b7499
SHA512f4b9f8a8bf0b2cc0deedda012a30c36e89d0bba9f02c84e1937a7a21ae27288f8a1071979225798af19cf0630d5b7226ce97b00486216d38475926ae08c99edd
-
Filesize
1KB
MD55877102f5b30c8ac4be8935a443c2496
SHA18c5b8229df75bbb740e93e67d6b4b5bf6707d448
SHA2566c043730405767b301d63f6a3b62c630bc0af2a6ed2689d248943c79fcd309ad
SHA512e15e5e875e02b523d813c5784a23d8d83726bb775a9ea25c98c32dd514f2433ff3098dbb3df9815c0782b4f2c238a1382b76197b6ba8512d7b0624cf7ca79e50
-
Filesize
4KB
MD554d01ff8afa46c53a53e3205b03e4db0
SHA1086b4736836a45d54af95664bd430d087b254364
SHA256976e5b884773a60cdec2a08630998acae5488a4c35668c939deb8af3893fc963
SHA512717c2905d348658ecd1a40ebf1d35fcee4eed91bf2ad29745e8e8dc9b46e5a21281380f8abf1ac80845b5a7f5808c4c14bf318a863ad1d2abb11d6e6787ff82c
-
Filesize
3KB
MD529c8a4be53b2ffe4fcce3acf97cf0d4f
SHA17aa3749ea6e8168ee0cbbd0481b8cdca74a5244e
SHA256406eb5652ec06358dfe2d10d8d8c3ca7f386956000575eab93f93ec763813487
SHA512ad10fc07963f1f36f4fab4109dbd57e5bbfa2075cf8b5e022775c3cd3b843c6c2d3c263fe837bfce0c4440b288a2c6b1cf9151b4f9b367e17ac1a1983de3ad0c
-
Filesize
2KB
MD5d7a6d992b2aa67d26ad1170f1d736d51
SHA1a085c7ebc6176cec98f1a37c51831132b3df57a4
SHA256bea22f4602f75e1253e2784ec92f74b37008c948768b7c33efac4d2cb8118ac0
SHA512377fee2145c0597b928411dff23b85116ad3fd17356f8d243a0ffd98ba01d8e26401d32c3857c211fbe76bfedcf2938e6bcf276009d36d3e90680bff10024626
-
Filesize
3KB
MD5e2bd077577485a4cd15bd293473906fb
SHA1cf15840379129ea1f4edc66cfa374a93f874158f
SHA256915aeb4e90279337870aef36e2d14293daf97d5bcd863287f15524884eb55c82
SHA5125d81479a1344b8979fe084be94fad7b8efe34d1d701d70104f1f916045a87aba078e4c1e9b8ce828ad4e37ba4a4699319e040ff345e58aafff9dddebf066221c
-
Filesize
5KB
MD5fc6b0f9840efba102a19e590c7bf2fcd
SHA1273311e8e343bdf4dea5043f810850f70ba00313
SHA25619820f04019e0136d89e23a5183a934494387066e9feb745918a43e5ca5f5afb
SHA512097323302553444153ad09eea43e48e9e07f2b4be99679420ec3686da26d00d42581fa86f639bc7b6d26933a2c5ea53c51ef9c62c604f3fe1e37e10ab46d5064
-
Filesize
6KB
MD5dcf8f81347b77d25f7afaaa8138830f6
SHA164e830c06f58a88d14afc88253feff37de7b8419
SHA25603470f6ad2dd0ba4edaf2a413b55cd97f6a1eba6e3cd60d9dbf0f7c67e466ebe
SHA512f9ee6c947b8a73b695fc8bfbdb13220da9a49808c01306125cabfd4b750d5e589a23acdd372f61a4243ed2e385f0970c481f5ac60f8ce204394f94c9d41a76ae
-
Filesize
5KB
MD58a4445a925c0b83c0d407558b287c3e1
SHA1bfaf525cec541ee19081a584b9e464163da38c53
SHA25628e78b1dfa147ad528d47f692d61b59266c754bff5c9e6723a5b808d5f4e3994
SHA512118c6a1b15002e05af4ed991cb1906516123a53835ac17379c0b7b23d32d8703b7819cdbef3ae0ca20cc2e29104cfc72222a83f569c11292aa5d20b259597f9e
-
Filesize
102KB
MD5990e6ed622cd01e3008491b23b2eadf2
SHA17973120ef8fc356b6ba7ea7d8dacd4267db59286
SHA256ea062a79527af054ee2522b0aeaed9fbbde8d73a08ba3d4dc508aa6f9362237c
SHA5125cbd9f12dc97d5a365580d60b2e96dae8e63b39ee4d97b8007f44a77aca338d24a1a25ecead3585b43f5f4fc5edfb6bd1260d4f960029bf237c37960e47f046e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd