Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 00:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://alsiadahpharma.com/
Resource
win10v2004-20231023-en
General
-
Target
https://alsiadahpharma.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446540625495235" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe Token: SeShutdownPrivilege 2232 chrome.exe Token: SeCreatePagefilePrivilege 2232 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2120 2232 chrome.exe 86 PID 2232 wrote to memory of 2120 2232 chrome.exe 86 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 5000 2232 chrome.exe 89 PID 2232 wrote to memory of 4908 2232 chrome.exe 90 PID 2232 wrote to memory of 4908 2232 chrome.exe 90 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91 PID 2232 wrote to memory of 3020 2232 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://alsiadahpharma.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe556e9758,0x7ffe556e9768,0x7ffe556e97782⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1900,i,8800067762656464730,10063910206733644596,131072 /prefetch:22⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1900,i,8800067762656464730,10063910206733644596,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1900,i,8800067762656464730,10063910206733644596,131072 /prefetch:82⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3260 --field-trial-handle=1900,i,8800067762656464730,10063910206733644596,131072 /prefetch:12⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3224 --field-trial-handle=1900,i,8800067762656464730,10063910206733644596,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1900,i,8800067762656464730,10063910206733644596,131072 /prefetch:82⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 --field-trial-handle=1900,i,8800067762656464730,10063910206733644596,131072 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1900,i,8800067762656464730,10063910206733644596,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD505edeb48d2b9deab380cf82c38bb7e88
SHA11fea035e5d4d08a35a375fffe80ce0c29d934275
SHA2566b2649202a570fec040cd3adb2bac63e7db436a51343a1b39b0442c16284a62b
SHA512a342478b88ab90b3b22a16b67a155f8c1693cf0c91fcc7693d744c871b1303132fdfdf239c90288961d80d3ffd7c0210428a1ab670583b95d7252a24d6f1e16f
-
Filesize
5KB
MD5d73824d000c77184d80b182b541e23cd
SHA113bc02bf59629ecc462ae8e7ccd8f5bc8248f866
SHA256136f3922fa2842c51b76a81ed0e204d6eea2a99c44e693588688996da03f73d1
SHA51236b4c08b05e918323bf7379e2ab5272c890cb55cb1530bafb80c572cd139152b4a750f50f450093b0503915db2564d730e7b9ffc640d31b8b26548f5397f7814
-
Filesize
5KB
MD553efe6fe95c6658d36afd5bc9d1494c8
SHA13432be128625e2b1b71d8f6013cb65460de2dcbc
SHA256cb0fece857327278f2160943d4a6dc7f2a5017b3db7b4a6be18ae09f013e8934
SHA512ac2f6d25252850fbf59a31ab77b8f0dce33638f23cdd760153e64d0edb10e28a0cea1d9583c12b8a0e9ea57324fd577f7df776567bd28b4caf3f83898411ee2d
-
Filesize
6KB
MD529d866dfcfd6020721258a651657579a
SHA174c8c7e847a6326098a41e2e70121ba9ebb0b726
SHA2564bd49df4cf65193cfc57492d3ce61bc829064c903d83d874a9e329c0bdbf5bbe
SHA512c4bf572e0a7abe42188136e6b52c20134f5eeef44d87a0d519e8df1c92d6cf71eb17116c0d9d35f5ba105825d22a7172ab4887b1728640276da1077cb34041e3
-
Filesize
109KB
MD56cdee69563d0233804792362131cb01a
SHA1d5a1e06b6505495e994b0d9d852ad243d7b52c2c
SHA256d07d6de430b71aa40edd66f5f819ba31d03d079de16badb6fd1d7a1f0cc2aefa
SHA512424e409e6b1a6e561fe3260fac316388b1813d35a5eb865f835c8d825c61dcb08f95ed74e856547d905b5b03b3e79ef75f5ea6a73a7f2e2c8c3d7ede30b34f3b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd