Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 15:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://d2xm5d04.na1.hubspotlinks.com/Ctc/DO+113/d2xM5d04/VVBnvT4fzdMdW8HYG-Z6kpxcHVDyhz95654-CN1m0Fql5nXHsW50kH_H6lZ3pgW3x60tp5MWnqgW2z27s44X98LqW3ckgbK2wpZJqW3-PJ-96LzZb3W3mnV6W5QH6RSW2v_-sp8D45VnW5WWTJv86vQvDW5yQRkk6x4FtkW7pCF_k69VB4pN7Dv-0mT4DVZW8JDDhz4_ZHWhW8T-rCl2Z9PmmVhnYW62b564SW4LZ4Fz2MrnqsW4c000_9jzT3fW1Gfb1Z1b3kM1W4F61PS6RbS8ZW4XPd295cCy96W5zd2GL2NHtJ0W5HDVkm47C3X7VhjVvD453qRnVjFm4m9kpKB2N2rmWPzhgL8HN8NzsTrMJWVRW8M4zMF720hBcW4jqw9q4dDpC9W6PlqSm5Sr4RYW1cL1ZM3dJ9rrW745rvM4ysxcwW73p9JC5NcpPJW24TVxp1gvl3kW6yFvbf32Z0Wpf4kZCDY04
Resource
win10v2004-20231025-en
General
-
Target
https://d2xm5d04.na1.hubspotlinks.com/Ctc/DO+113/d2xM5d04/VVBnvT4fzdMdW8HYG-Z6kpxcHVDyhz95654-CN1m0Fql5nXHsW50kH_H6lZ3pgW3x60tp5MWnqgW2z27s44X98LqW3ckgbK2wpZJqW3-PJ-96LzZb3W3mnV6W5QH6RSW2v_-sp8D45VnW5WWTJv86vQvDW5yQRkk6x4FtkW7pCF_k69VB4pN7Dv-0mT4DVZW8JDDhz4_ZHWhW8T-rCl2Z9PmmVhnYW62b564SW4LZ4Fz2MrnqsW4c000_9jzT3fW1Gfb1Z1b3kM1W4F61PS6RbS8ZW4XPd295cCy96W5zd2GL2NHtJ0W5HDVkm47C3X7VhjVvD453qRnVjFm4m9kpKB2N2rmWPzhgL8HN8NzsTrMJWVRW8M4zMF720hBcW4jqw9q4dDpC9W6PlqSm5Sr4RYW1cL1ZM3dJ9rrW745rvM4ysxcwW73p9JC5NcpPJW24TVxp1gvl3kW6yFvbf32Z0Wpf4kZCDY04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450528052559712" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3364 wrote to memory of 5080 3364 chrome.exe 32 PID 3364 wrote to memory of 5080 3364 chrome.exe 32 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 3516 3364 chrome.exe 89 PID 3364 wrote to memory of 4628 3364 chrome.exe 88 PID 3364 wrote to memory of 4628 3364 chrome.exe 88 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90 PID 3364 wrote to memory of 4956 3364 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://d2xm5d04.na1.hubspotlinks.com/Ctc/DO+113/d2xM5d04/VVBnvT4fzdMdW8HYG-Z6kpxcHVDyhz95654-CN1m0Fql5nXHsW50kH_H6lZ3pgW3x60tp5MWnqgW2z27s44X98LqW3ckgbK2wpZJqW3-PJ-96LzZb3W3mnV6W5QH6RSW2v_-sp8D45VnW5WWTJv86vQvDW5yQRkk6x4FtkW7pCF_k69VB4pN7Dv-0mT4DVZW8JDDhz4_ZHWhW8T-rCl2Z9PmmVhnYW62b564SW4LZ4Fz2MrnqsW4c000_9jzT3fW1Gfb1Z1b3kM1W4F61PS6RbS8ZW4XPd295cCy96W5zd2GL2NHtJ0W5HDVkm47C3X7VhjVvD453qRnVjFm4m9kpKB2N2rmWPzhgL8HN8NzsTrMJWVRW8M4zMF720hBcW4jqw9q4dDpC9W6PlqSm5Sr4RYW1cL1ZM3dJ9rrW745rvM4ysxcwW73p9JC5NcpPJW24TVxp1gvl3kW6yFvbf32Z0Wpf4kZCDY041⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9e2e9758,0x7ffc9e2e9768,0x7ffc9e2e97782⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1944 --field-trial-handle=1896,i,5089862346886172480,14444463736056347402,131072 /prefetch:82⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1896,i,5089862346886172480,14444463736056347402,131072 /prefetch:22⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1896,i,5089862346886172480,14444463736056347402,131072 /prefetch:82⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1896,i,5089862346886172480,14444463736056347402,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1896,i,5089862346886172480,14444463736056347402,131072 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4676 --field-trial-handle=1896,i,5089862346886172480,14444463736056347402,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1896,i,5089862346886172480,14444463736056347402,131072 /prefetch:82⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1896,i,5089862346886172480,14444463736056347402,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4952 --field-trial-handle=1896,i,5089862346886172480,14444463736056347402,131072 /prefetch:12⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5372 --field-trial-handle=1896,i,5089862346886172480,14444463736056347402,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3684
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x408 0x33c1⤵PID:676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD54d292e8a11850f786354aec26ae2f00e
SHA10c105ae0a15ab3c919035d0d7334c191088bde56
SHA25620bfed1c14a8cc9bdc2ac7d328c30ebccfa0184ae6dada115c6d33d4d50a8709
SHA5125d83c48bbd96e532fe2546b0e56c2ebcaefe81f04fd603dd287e184403ea4373d409725ce3be470ca3b87c603cec542ec32f16458c212e8e1c63e460f2cd2fed
-
Filesize
6KB
MD5572ae7d52223da8ba1432777ceb1dcb3
SHA1281dde69771520ad81d3d88ccbaaec13e74de522
SHA256dca23dea6edb4fe654b9563f784169b4f2e3d3ee6c079acada499319d6ecb9a8
SHA512e5dc8620133406d4c2eeb2c36f64045c460ad31a6fc2749c50fa95d6d2698b1e073bc19da91e4c53d248af99410e7dfa08949ccb1554359659e3c2b86e317fbe
-
Filesize
109KB
MD5fd493d5ab5f2a54800428c3196bb1365
SHA1d03ce522e2ccca0e88b6c7baff2e34e11916caba
SHA256fcffd7ca0a139693e6b09302b2f4f0821039138b454a429f665a14a955146a85
SHA5129caa77ed621f064f613af6dac27bdcf03031ee911ccec1aeef9ef7bc447cdbfab4fedf3cf9b202a4e49a25dcf92e13f2a556e6a7ef41c2e21e1ac8d819903484
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd