Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 15:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mypethealth.com/auth/reset-password?userId=5446303&code=CfDJ8G60OHfbDrpMtPzdLjGeu8NgEiujnqls41M8EyRajQqtg7ar6ge6KTWuoK3HBJfr7kWTMiXIkxVK0vVenxl8gaLaeDouKxQkONMMoi3sU6zidyR32e4V2R1dIe9ozqjmm%2fiSDYRHu8QU%2b6ElXSXfEts%2b9v0LrtQbRMcXLpT%2f2c18pmdxXfCJCSHmnIDDl%2bc5lbuMU2NgwRMEdOmX4nd2rZM%3d
Resource
win10v2004-20230915-en
General
-
Target
https://www.mypethealth.com/auth/reset-password?userId=5446303&code=CfDJ8G60OHfbDrpMtPzdLjGeu8NgEiujnqls41M8EyRajQqtg7ar6ge6KTWuoK3HBJfr7kWTMiXIkxVK0vVenxl8gaLaeDouKxQkONMMoi3sU6zidyR32e4V2R1dIe9ozqjmm%2fiSDYRHu8QU%2b6ElXSXfEts%2b9v0LrtQbRMcXLpT%2f2c18pmdxXfCJCSHmnIDDl%2bc5lbuMU2NgwRMEdOmX4nd2rZM%3d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133398712582532510" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 876 chrome.exe 876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 728 4888 chrome.exe 19 PID 4888 wrote to memory of 728 4888 chrome.exe 19 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 4784 4888 chrome.exe 91 PID 4888 wrote to memory of 5016 4888 chrome.exe 90 PID 4888 wrote to memory of 5016 4888 chrome.exe 90 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87 PID 4888 wrote to memory of 1476 4888 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mypethealth.com/auth/reset-password?userId=5446303&code=CfDJ8G60OHfbDrpMtPzdLjGeu8NgEiujnqls41M8EyRajQqtg7ar6ge6KTWuoK3HBJfr7kWTMiXIkxVK0vVenxl8gaLaeDouKxQkONMMoi3sU6zidyR32e4V2R1dIe9ozqjmm%2fiSDYRHu8QU%2b6ElXSXfEts%2b9v0LrtQbRMcXLpT%2f2c18pmdxXfCJCSHmnIDDl%2bc5lbuMU2NgwRMEdOmX4nd2rZM%3d1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccf189758,0x7ffccf189768,0x7ffccf1897782⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1868,i,9797664723818364279,6835290686116418405,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1868,i,9797664723818364279,6835290686116418405,131072 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1868,i,9797664723818364279,6835290686116418405,131072 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1868,i,9797664723818364279,6835290686116418405,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1868,i,9797664723818364279,6835290686116418405,131072 /prefetch:22⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1868,i,9797664723818364279,6835290686116418405,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1868,i,9797664723818364279,6835290686116418405,131072 /prefetch:82⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3660 --field-trial-handle=1868,i,9797664723818364279,6835290686116418405,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5ef4023d88120772d7146b9be28bac2b5
SHA1b5a93abfc53861bd1f62adaadc3809d936c8cdb4
SHA256df9c2e8462df1602581cee5de7edc83ae7be264b949ebccf098aa2fd71a6ff9b
SHA5128027b6eb80020326c0e746b37646f10b7b90f1ce39c74e984726258cfe5554cf2e5ea084aea8e3cfe772e6d0a124e79c7262f387a11ac5bb3a0f54567a876969
-
Filesize
432B
MD5849ad93b0d92fb201d022c1f82d78179
SHA15ba0b213387f5c7c96248df48264517244c094cd
SHA2565cf382cb55468e6f2662443c93c2698f7593c87b5d0094fa247fda72df865652
SHA512e8cac1f5df98a565ed5a73f76946e4ef888dddb520b0d26309b9d411431c8e5f8a5a922d801776d3c987ebddadcce04811356113ec11cfdc5b0346b702f24270
-
Filesize
3KB
MD5092ca39a5761052308b1339fe8690cab
SHA1e3aab7fdec6de334fc4f1c5d7ceecbb2de22c086
SHA2560b58d550251aab069cb63cefc75fe24a7dde779c8daf525549ad151e0d9c3e10
SHA51236f6ae49eaea7d0f29b7baf6a59c7239ca594c54249010258df972f6ffc0e20e6bc7c78421277ffd1977e46f8dff1c6b7bc25968729b2b58927d1ae3c7704094
-
Filesize
1KB
MD5481c4fbc05ba448f50f2787fab54de11
SHA1874da5bcd3f891d8470db8eb6aa20321b6667a03
SHA256c046903b5d6826651155c713a947b70a06bf8a17cd3ff8b6dbfbefa8987e4d53
SHA51265649ba66e256e5d4b01b38ea137ec588bf5dc91a064fb5fa60e51a8587fc340fbd08ea64d35c0ab4df13d96dbab62c23e34229050a4cb3d80fd8a1a2d5a86c7
-
Filesize
6KB
MD5b8135be8cacf5c2fa323319459f7886e
SHA1729f251730918b77d4b7247846c0131b9a6ac700
SHA256db123677f591d45e879c1ec8b42ff7bba76826f44c4c94831d1abde1b509d74d
SHA512d675c9261260c5c21545db5e09d0769b3c1dc7d3b03a8c471249c32d7d4f6135084f94734fdfcba0d414fc51121f825a73b7e9607378b1ea0d5d5b26f4eeebb3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd