Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 17:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tracker.club-os.com/campaign/click?msgId=&test=true&target=http://ghfhgd.mobilesmith.sa.com/[email protected]
Resource
win10v2004-20230915-en
General
-
Target
https://tracker.club-os.com/campaign/click?msgId=&test=true&target=http://ghfhgd.mobilesmith.sa.com/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133414326451322811" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 2588 chrome.exe 2588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 3352 4132 chrome.exe 74 PID 4132 wrote to memory of 3352 4132 chrome.exe 74 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 1440 4132 chrome.exe 88 PID 4132 wrote to memory of 4192 4132 chrome.exe 90 PID 4132 wrote to memory of 4192 4132 chrome.exe 90 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89 PID 4132 wrote to memory of 5052 4132 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tracker.club-os.com/campaign/click?msgId=&test=true&target=http://ghfhgd.mobilesmith.sa.com/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbe0b9758,0x7ffdbe0b9768,0x7ffdbe0b97782⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:22⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:82⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:12⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4852 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4912 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:12⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2988 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:82⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2984 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2976 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:12⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5240 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:82⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 --field-trial-handle=1876,i,15042281371058913805,8248683224178931648,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
216B
MD592850425f5f58b80ada7f4a0c04289a3
SHA15bae071b41c80da7edd74e734f8d007618e22a79
SHA2566c9192c201838cd6ac3729f70413b81e2d607974309d90a848fbe9a3acde4374
SHA512d90a221f278681ad2b43efc6ca843fab19d8d78f8d4debc91a7023d8439b32454a20c8b3620c4ab152e4585e046aa8e53f9e95bd48c3597ed66f99590aa36296
-
Filesize
1KB
MD5249876683cfcc838fe1cec2f9ecc8a1d
SHA19b6dc05db7cb0d58f8ec51304ae6cbc9e6990510
SHA256e0adfbd53474636362618268c3d8b582ad3cde52604c60e379fb02150aebfe3b
SHA51277cae246a39f0d17e53a924f60f65f913833eb7fdbb2bf28142dc33af813e5551c5ab997348285757b468d86c15784e87b6dfb2a46579fecfd0d4502d686402a
-
Filesize
2KB
MD5594f1b2397bc7ed101c8dabae7f22e3b
SHA1c0501f6e2cff1712b0dfc7897442c441a026b957
SHA256ee6d5b37fbd6534f9e768f16618c8689abfb04d6cb7b12558ccf51bd1402ef2b
SHA5124e4dd927179773852fc0bbd6d476d3919cc3d970dc8b93493f75fb631d54dca9d6303ad47e5e2e5a55392913ac34e2081cff5b3fa66623b5ab8352a0ad9eff11
-
Filesize
1KB
MD537019b8a056d2a4d148a595fd75b8a3f
SHA11d5c58b640e7a4b4748d27f2d9d5038d8cc5ed59
SHA256be5782f065c8beb38a939cfaac0039bb452653ce4eed5d3848a692d4739cc9a1
SHA512f3b0c9c07ef3cf75abd5c2ff2515dcdfaa23414854de331bc3f25d8181615c593351d9c66b0eaf2634e34796917953d250f7cdddc36f74af2a38811f210760a9
-
Filesize
6KB
MD58b329aa375ed2a7c71ce00f624256349
SHA1599f84d4af2b0cac9914825a136b7cbdd4535a1d
SHA2567ee05fa45b9ab423463de386b8192a2c73cbcbb35e2bbacee770165ecbe9e903
SHA512a71115112aa4ad5605d697bafd609d2ead3fcdcedc03c46fb7ae7cdc6e88df00da9cf55079704f9bab20a4ae287aaf68c02d72d3089da396e470e540888647f9
-
Filesize
7KB
MD512baae3bab14d05509d3b8da201a53c6
SHA1a0ec1aad6e5da6de23000b6f0c3694654a5c3ff6
SHA25654147b47dedfce6bbac48eb6b6d68dde25ab955ebb78bdf3f01f8a1f5286e7b8
SHA512653ab46f5b3553044e04d3d96f945bec11859283680f59e071d979b1535cc9f4ff047b9c3321e74d47233598d4af7e0f647535acc0310b0c3289384ceeecc6f0
-
Filesize
101KB
MD50a968864f3fea211b27e999ab45b705d
SHA1b8a98b21758bf730892794d61d2bff95766cbdb1
SHA256ec617a839cee287d88d90b799e031bf301db4e2751bbf3deaed7851fe2713015
SHA512a99a25cabf7a4ebdeaa37bbb63e8233338a4bcd156b0edf8cd0242d521fbda0252f5d67ade762a9945683a512c4025196a671f924794bb28e7b0532d6aa8ce5d