Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
07/11/2023, 11:55
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/amp/s/api.gateway.ethswarm.org/bzz/9b0f4c3db3acae22b46cffc9ae0e6050cd0868e98014d05bdd30b28e41398590/#[email protected]
Resource
win10-20231023-en
General
-
Target
https://www.google.com/amp/s/api.gateway.ethswarm.org/bzz/9b0f4c3db3acae22b46cffc9ae0e6050cd0868e98014d05bdd30b28e41398590/#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133438317558045867" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2404 1768 chrome.exe 70 PID 1768 wrote to memory of 2404 1768 chrome.exe 70 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 3560 1768 chrome.exe 72 PID 1768 wrote to memory of 5068 1768 chrome.exe 73 PID 1768 wrote to memory of 5068 1768 chrome.exe 73 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74 PID 1768 wrote to memory of 1432 1768 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com/amp/s/api.gateway.ethswarm.org/bzz/9b0f4c3db3acae22b46cffc9ae0e6050cd0868e98014d05bdd30b28e41398590/#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8a64a9758,0x7ff8a64a9768,0x7ff8a64a97782⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1580,i,9397403084051761120,3901324014569079474,131072 /prefetch:22⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1580,i,9397403084051761120,3901324014569079474,131072 /prefetch:82⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1580,i,9397403084051761120,3901324014569079474,131072 /prefetch:82⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1580,i,9397403084051761120,3901324014569079474,131072 /prefetch:12⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1580,i,9397403084051761120,3901324014569079474,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4360 --field-trial-handle=1580,i,9397403084051761120,3901324014569079474,131072 /prefetch:12⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 --field-trial-handle=1580,i,9397403084051761120,3901324014569079474,131072 /prefetch:82⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1580,i,9397403084051761120,3901324014569079474,131072 /prefetch:82⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4888 --field-trial-handle=1580,i,9397403084051761120,3901324014569079474,131072 /prefetch:12⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD5c07a8a09b514793d9b095f53698ff69f
SHA1a8c5f5a9f62e1ef3bfb6885349f3281f5ad6d909
SHA256c443fa476f614f41b654fb7f6d95322cc4ee1ae53a1eb729fa7db0c3ccb08bd8
SHA512a6f87b09c777e799b06def18c1cd73b4f83a9f24d3a6520232879e87bf33fdce4de77d59d05b3bc7e8511e6b8ee76a3bd7c2768cd4ccf9ab4a9f7dbd0ba6a190
-
Filesize
6KB
MD5626610230452651ca66797b1bf65a201
SHA1dd242f87b63e8ee604fb4b32a7ddf869f1fc8f3b
SHA25698047827a0a963b5bff05624f6730776e84511bbee1c082407d50fac0df213ca
SHA512310f43e921773def9d2171a6e66555385d3a58ae53710cff3f37fc490b3f8ba7f68278727dee15ec4d77ed37f836f7069b4d882a2abb19cc4284f980cc099364
-
Filesize
109KB
MD56a0fdd320b8e9e744f5aab019200fce4
SHA1a5dbec06c68326c87fa6b9f3cf07c778d54cb096
SHA256cd2a1061c1db276a575243e5d7a045f33ca49e65d433a87aa1d31aa93466fb42
SHA51237bcf988803b724537d94bce15870530ec99302f6d4b80ff60333a09125d49cae6bd0968cab5ecf170eafead7d1063173db9c2b915af62f1f733127b25c82075
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd