Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 15:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://aramco.us8.list-manage.com/profile%3Fu%3Dcf7e991ac24f952c144b252c4%26id%3Ddff5a73cfc%26e%3D8b48b9fa41%26token%3Dcf7e991ac24f952c144b252c4-02bbf30740161288e48d384ed5780c93-1698078145_67a5dcf027a9d578cc8f8618974a10719e9bd53a3f1d6fa7d92b6ff928b621e5&xid=e511a95d0f&uid=199064994&pool=contact_facing&subject=Aramco+-+UAE+Projects:+Update+Profile&v=1&h=0befb5b3d6ecae6646afdce5ca7b652e77a4dbfd6d79bcb85e3ba2e7a7838d43
Resource
win10v2004-20231020-en
General
-
Target
https://aramco.us8.list-manage.com/profile%3Fu%3Dcf7e991ac24f952c144b252c4%26id%3Ddff5a73cfc%26e%3D8b48b9fa41%26token%3Dcf7e991ac24f952c144b252c4-02bbf30740161288e48d384ed5780c93-1698078145_67a5dcf027a9d578cc8f8618974a10719e9bd53a3f1d6fa7d92b6ff928b621e5&xid=e511a95d0f&uid=199064994&pool=contact_facing&subject=Aramco+-+UAE+Projects:+Update+Profile&v=1&h=0befb5b3d6ecae6646afdce5ca7b652e77a4dbfd6d79bcb85e3ba2e7a7838d43
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133425497508876581" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3372 wrote to memory of 4756 3372 chrome.exe 50 PID 3372 wrote to memory of 4756 3372 chrome.exe 50 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1220 3372 chrome.exe 89 PID 3372 wrote to memory of 1532 3372 chrome.exe 91 PID 3372 wrote to memory of 1532 3372 chrome.exe 91 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90 PID 3372 wrote to memory of 3456 3372 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://aramco.us8.list-manage.com/profile%3Fu%3Dcf7e991ac24f952c144b252c4%26id%3Ddff5a73cfc%26e%3D8b48b9fa41%26token%3Dcf7e991ac24f952c144b252c4-02bbf30740161288e48d384ed5780c93-1698078145_67a5dcf027a9d578cc8f8618974a10719e9bd53a3f1d6fa7d92b6ff928b621e5&xid=e511a95d0f&uid=199064994&pool=contact_facing&subject=Aramco+-+UAE+Projects:+Update+Profile&v=1&h=0befb5b3d6ecae6646afdce5ca7b652e77a4dbfd6d79bcb85e3ba2e7a7838d431⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaffee9758,0x7ffaffee9768,0x7ffaffee97782⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1808,i,9927628614802867569,6697794056393032306,131072 /prefetch:22⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1808,i,9927628614802867569,6697794056393032306,131072 /prefetch:82⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1808,i,9927628614802867569,6697794056393032306,131072 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1808,i,9927628614802867569,6697794056393032306,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1808,i,9927628614802867569,6697794056393032306,131072 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1808,i,9927628614802867569,6697794056393032306,131072 /prefetch:82⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1808,i,9927628614802867569,6697794056393032306,131072 /prefetch:82⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2816 --field-trial-handle=1808,i,9927628614802867569,6697794056393032306,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55d52bd7039f84c0ac753cdcf8820a87c
SHA14df08003b8396da257e6b3be7ac0267040dd3dc1
SHA256ebe2c5b8739ce1d7442335860e81f4c28fde211f3e5f03231678b92ee5ed9c76
SHA5128a76484c181f9fd2ae5d82db7e5abee843a5db4a48f49aa718d8caf462f3b05b2375a5d3c18f018aff4dfecd27a1ce6b6dd806f1a47bad3d01fe29ca1cbe7765
-
Filesize
6KB
MD5c6fb5b8e215ed2446391f0a82a378c86
SHA1a1ed640c5771ecfb48799d4900b5e3d24895a580
SHA2560b6c2a5dbb5c9eaa7993e58d3e43bc212228c7d8423147b46ad6fc3650a29f14
SHA5121ad49b559d4d52696f29e5383a097a87e0a742886a89021ea40342c3a948846a93a3d89faac60681e07a2c9a1e80e93343ad371fe771635b2a94a9117449829e
-
Filesize
109KB
MD5549740b0c3b84980a523d57f5edea69f
SHA10748c528caaa413e33eff5fa4888cc437601e2ed
SHA2565c1bfd2511931a4a15f0cfa31b775e35e34d2e326a777a2408c8c63f179b1bfb
SHA512e88d9f6b2c17b85b2f754e9966c64d87739d6c2ca8e7110d6a9d777739fb0314d400da794c28caedd4d6de2c5457b0966f796daa8556bfb7f42326d8e4eaea89
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd