Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 10:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click-v4.junmediadirect1.com/click
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
https://click-v4.junmediadirect1.com/click
Resource
win10v2004-20231127-en
General
-
Target
https://click-v4.junmediadirect1.com/click
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133467655488262763" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3152 wrote to memory of 980 3152 chrome.exe 18 PID 3152 wrote to memory of 980 3152 chrome.exe 18 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 1516 3152 chrome.exe 90 PID 3152 wrote to memory of 3484 3152 chrome.exe 92 PID 3152 wrote to memory of 3484 3152 chrome.exe 92 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91 PID 3152 wrote to memory of 4780 3152 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://click-v4.junmediadirect1.com/click1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc76709758,0x7ffc76709768,0x7ffc767097782⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:22⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:82⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3304 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:12⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:82⤵PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:82⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4980 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:12⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4928 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5148 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:12⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4488 --field-trial-handle=1880,i,3760880653836683596,8340502786279394070,131072 /prefetch:12⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD56c377e034b26971278b1ea663b81b5ea
SHA122f6077af626d1d73d3ce9aa8bbb065e5b4eb2e8
SHA256bda9e5404840c262c6d8db1dabdd33d9c0b51afed2af189e9ed706179a58bceb
SHA512d92483da77ded216271cb429f890fc8c76fac80809541f81a6fd8d5c025dfd1d3511f51f8b2d1f15cc55a86f44ab01d07fbaa1fd2730933d039b35e36d0c61df
-
Filesize
6KB
MD51849d58c5f38760b6281bb1136844d77
SHA1db880da9deacf5616c5bb456d4abf369ee454b4a
SHA256829ed0a3aceef190f05c50d67bd66d1fd97c52d28c1e4288271dd16defbe1c26
SHA512678546b35b28411ce76d7b694bc64470a1147d866ee536217d6d61d65195087ca66e0d8096a9640c031ab42d387c1a800191d5e50898c2fe0b0e781b436dece2
-
Filesize
115KB
MD5108e09ee357d126718d11bc4a1625f37
SHA14a84255dc2e53cbc777d5807e0dbdea1a1268c1b
SHA2564764eefb6efc6281dcb95de2fb812414d357cf58e06380f2502099456d2e0197
SHA512989f6efc612a04f665be1d214a884a066eabc30d6e52a4999edb1e6dd6f9a51c0ca494de9f849ba3f8c79557169c42c1ec3aa6c7e7a4fb73f10af41af68d7f05
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd