Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
19/11/2023, 07:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://rides.sng.link/Aw5zn/ernw?_dl=uber%3A%2F%2Ffamily%3Fid%3D0&_fallback_redirect=https://fannoholding.com/imole/beard/uqbsf/emFzaGthbmFuaUBtb3RjLmdvdi5xYQ==
Resource
win10-20231023-en
General
-
Target
https://rides.sng.link/Aw5zn/ernw?_dl=uber%3A%2F%2Ffamily%3Fid%3D0&_fallback_redirect=https://fannoholding.com/imole/beard/uqbsf/emFzaGthbmFuaUBtb3RjLmdvdi5xYQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133448517092657516" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 616 chrome.exe 616 chrome.exe 556 chrome.exe 556 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe Token: SeShutdownPrivilege 616 chrome.exe Token: SeCreatePagefilePrivilege 616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 616 wrote to memory of 2904 616 chrome.exe 66 PID 616 wrote to memory of 2904 616 chrome.exe 66 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 4672 616 chrome.exe 74 PID 616 wrote to memory of 2772 616 chrome.exe 73 PID 616 wrote to memory of 2772 616 chrome.exe 73 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75 PID 616 wrote to memory of 2052 616 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://rides.sng.link/Aw5zn/ernw?_dl=uber%3A%2F%2Ffamily%3Fid%3D0&_fallback_redirect=https://fannoholding.com/imole/beard/uqbsf/emFzaGthbmFuaUBtb3RjLmdvdi5xYQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff98a5a9758,0x7ff98a5a9768,0x7ff98a5a97782⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1780 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:22⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:82⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:12⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:12⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4700 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3100 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3084 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:12⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:82⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 --field-trial-handle=1816,i,17359633400589821443,6325039798004679564,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:556
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD5f196eebab556d7e80aa2351342aff017
SHA1c302cad4d056f77db368506e2f0ed94824f8f2c6
SHA2565f252fee9f3d4ca24e328a817838b1c7aa2aa46f83787d51b9127a4c95f77906
SHA512f81c93cc8cb8aeb9bf3aa452a2a0e98ea54e44c108532422e0b060d0e7fef942772bbad90d5809cbb8039e01083c56393bd8852e531d3d70ae1f3d70e89309f5
-
Filesize
2KB
MD5f3fa77ef5e4c55ad536ae883db1d3b9e
SHA1127deb52aa6156479c83dd14342a276834b7910e
SHA25600c81cc469e49a5bbb764225feebce43b68c4d86085819ba1ffacd8dc00b03b4
SHA5129da07c6de08d71f0fb906199b7f938fe712dae0509f20d2abea6bbb6e3e85e4ab044d3830e4631f5db1823a36535662c8bc0c4c76e9af5114d40cc02c500a177
-
Filesize
706B
MD52db99e0985f7c6f9f2f8654f9bf0d514
SHA18a6321bb957abfb7d7e73a86ffba28b5a2fa103e
SHA256b7b8d98168bdf8bb8ead78b5714f54d016e088213ba58c279f496d8cc558ec1a
SHA5125a09d82275d090a716ab49235003600fe5955cc6c10394d15fe34b3e5b45c7a98a0b82bc8660763f7e1dddfb38e4dab2a52a9547570626691eeb6a8ead2763a6
-
Filesize
6KB
MD57af893f830692346ab524496dd025ff0
SHA1e37e94b9e858c36ba21d29079a35d8ebad9e9a28
SHA256bde35f862991775b6523afa3a5ec5bafce4ee80fe81acb12f489590868feeccb
SHA512e80aa3cc49c6e457148ec0cdb53d2148dd2990237fe512f671a46d30857f2f934caad21d5376e4b672007de30d2daa517bce2315683f858548cda645517c3131
-
Filesize
6KB
MD581f81fd6cc42a1814d0d52748db2bcd1
SHA161a376a55ab5b102cf914a7d47822a632acf1a6a
SHA2562e6daa2947cea091265af82c62bca187d5b44a737d8f6543efe66e742bfeefbd
SHA512f92b6eb21ed6f7a7f4e1a350d97e962727b393660a5fd04efb97807e7c22b77ebd47126ef1028d2bf194afee6c47226d2770f3e65c654c61ba2b5baf2bf5ef5c
-
Filesize
6KB
MD50285fdaac5005d5147dca04e1a99e9d2
SHA1f10b0b9f315659e976126b1146ca44e3cde4669f
SHA256b5f2d75d8a1c65d441d8c336fb73708de62f988b0b247de00c560d759d065cce
SHA51233bd425b571427e14805be2f10c76725739b1db9d29a63a113733fba53346ff25a982ab89ff77fcd5bdf0bd1ecde3162c5f6329ed3a25b458822e0a65ce14daf
-
Filesize
109KB
MD5e612a8f10296b467457cd20c3307bff4
SHA1c05b68bce9d4fcadbfefda749d39c95bcc20919f
SHA25650621488868b2401839cc409663be86b431c8f9e0cd5a5ac5f1df699eb01609a
SHA512c12e9659364d366c38129880d892a5e613fcaa787dce1e45483f61ff4a691552f1d68949ea2884212c62d258c1bbc192ceaa9bbae0488da0a8f3cd51d0641c07
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd