Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 09:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://net.ss-s.site/WIZlNK.ES/app/Iogin.php?34252K0078H028S14E2119&contextType=external&challenge=8b8f344a
Resource
win10v2004-20230915-en
General
-
Target
https://net.ss-s.site/WIZlNK.ES/app/Iogin.php?34252K0078H028S14E2119&contextType=external&challenge=8b8f344a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133413166390468983" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 1148 chrome.exe 1148 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4936 4832 chrome.exe 45 PID 4832 wrote to memory of 4936 4832 chrome.exe 45 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1832 4832 chrome.exe 85 PID 4832 wrote to memory of 1788 4832 chrome.exe 87 PID 4832 wrote to memory of 1788 4832 chrome.exe 87 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86 PID 4832 wrote to memory of 1008 4832 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://net.ss-s.site/WIZlNK.ES/app/Iogin.php?34252K0078H028S14E2119&contextType=external&challenge=8b8f344a1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd02ad9758,0x7ffd02ad9768,0x7ffd02ad97782⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1888,i,1279841900257652128,10054510120596672359,131072 /prefetch:22⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1888,i,1279841900257652128,10054510120596672359,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1888,i,1279841900257652128,10054510120596672359,131072 /prefetch:82⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2912 --field-trial-handle=1888,i,1279841900257652128,10054510120596672359,131072 /prefetch:12⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1888,i,1279841900257652128,10054510120596672359,131072 /prefetch:12⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1888,i,1279841900257652128,10054510120596672359,131072 /prefetch:82⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1888,i,1279841900257652128,10054510120596672359,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3032 --field-trial-handle=1888,i,1279841900257652128,10054510120596672359,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4272
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1868
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504B
MD51b2846a1ae4b0e31af4d5dab3abbdd48
SHA1fd998d250df177c85925c7f9576dce488d1f3ad1
SHA256bc27b5c4016cae6ae5431e8bb40b427f35c6b046605bd1408ef0ff6847dcc679
SHA51258d83b1f7d3d5a69c8d3bd28b63a7b85d534bb4045c285ff5bfdea99b176b49fe97f970f98e5035db946651c38e5e5b65eb06c6e15c2cdfef2a701fafb637625
-
Filesize
1KB
MD591fd2a66e80eeb65cf665e8f89fac22d
SHA11777181e9513615ea85ae6f327562e6c1262fc88
SHA256d4c9052767d29aabf16878facbc431e5fc58ab0d6f0b2bdb972036a1f9e67730
SHA51288aa06b818e14508b0411434aed29adac4e4163f5b0be1345e5752411239e38a88c9960f18d9795e438dce089490ac541b86f65e48a5cb2d5ebc90917d38fac1
-
Filesize
1KB
MD5abedf46cf699fcc9fb34c7e4f6c8e913
SHA12e771fb9651e69c97fff68e758474763518df465
SHA2567af8d5a504b22c39f01f87f4b8d570634840e7559bcac09295e8d6bbd2b37a48
SHA51204aa09ab7de04aa434beb0ef7c5407f1162b3e633bfc5c27c5334cde00437c0d5b27367c54d66ca64fcfc357a3338c4a0086ddf322823b074a939cc15377c568
-
Filesize
538B
MD5f428aeef18fab1ee23826882cfd12c98
SHA1278cf50000aaf0e546e71fcef72c29322aadbd55
SHA2562dc28976ab1a569c50160225dc84ce13b221c15353373ed31f16eb491efbda3d
SHA512d73229e24fca8b653cd4b88f4d875e7f5d34d42b008da80634d0005ce79c4a827cd74b08fa33fbaba992cbe92ec6f914530563de79ff61be27ac4074f53ce41a
-
Filesize
538B
MD5f31e41b995eca7de64cd65feb995f636
SHA142a192a39d91570c881d142285edc416cf4440ca
SHA25690d24138b6734724056e95a41c21a082ac50bddda63f1552447cec3d43fc584e
SHA512769d62281db63c240abdc49b1d78f7dccb232cbd1dfc2ee41c48d44d2a95daf006c5ec37f718bf05063d452ff1a7dd74921de72df06574fa28bc497f668c8c24
-
Filesize
6KB
MD5038e8956f350e473830be959afb6888f
SHA1f312085c2a1a22c8bc16eb8434677e98e675b460
SHA256aeec8a08a71556004b1c462e96ccf389117e64bfcbe919dfac24e77287fe1206
SHA5124b4b039e5bcbec77ec4522f78fd077f6aec18cf0f46e565d48ec881b9f6232a3b5102c8c45d926fafbe63a9c083611c9019f57bff182867ac5d8eec2414f9bf5
-
Filesize
101KB
MD55b0a17fae2a16eb01f32b9ef5bbf6c95
SHA1feba5df9477620575c0348de859d09c361051310
SHA25601afaa3631bb9e05a660b6dbc6e9e6b6a8190f48a8fa189041ca6f558fb00c4d
SHA512c7eda7301cafbf70cafed7a88daa3bddfc99e5dbdffd5ed638febd7555a6fd9e0820c13116cb4e461e1d8591370fa7aecb7eb424ebdda1fa6c08483ef9943465
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd