Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
11/12/2023, 15:35
231211-s1n58scbc4 111/12/2023, 15:34
231211-sz6c5acba8 111/12/2023, 15:31
231211-sx74yacad5 1Analysis
-
max time kernel
300s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 15:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chat.whatsapp.com/E5DWsQMGY8L70v14hzGe26
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
https://chat.whatsapp.com/E5DWsQMGY8L70v14hzGe26
Resource
win10v2004-20231127-en
General
-
Target
https://chat.whatsapp.com/E5DWsQMGY8L70v14hzGe26
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133467823003568213" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1176 chrome.exe 1176 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 628 1176 chrome.exe 43 PID 1176 wrote to memory of 628 1176 chrome.exe 43 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 4276 1176 chrome.exe 89 PID 1176 wrote to memory of 3148 1176 chrome.exe 91 PID 1176 wrote to memory of 3148 1176 chrome.exe 91 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90 PID 1176 wrote to memory of 3300 1176 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chat.whatsapp.com/E5DWsQMGY8L70v14hzGe261⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb8e159758,0x7ffb8e159768,0x7ffb8e1597782⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:22⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2132 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:82⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:82⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2156 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:12⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:12⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2812 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3672
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:944
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD52ff718764ba35b4784ee445ac412a6b2
SHA1165667cde4aedea0e2c9aab3aa0193eb9a438649
SHA256854d49a060f781ee0d7278369a2e57a58885f0634e632e8efb722020d2184a72
SHA512f6fe37e14dd1d3523fea769b1d3622d8018da5dab56119cb2b9349d07844ec1ee1c2572d7645554c3846ac53c2979abb0ad5f3b2771c5ef7cc4a01ce0dad3e6c
-
Filesize
2KB
MD5304c66552a6c58c0ee70a87526826dab
SHA129957f0e145440e7a356524aaae1eccbdd179be6
SHA256046ef8717003262979380c1c337612ad6483ad700a207606899d8c90e6c38f7a
SHA512c7a066e6ebf064f8af4f56bd4d406f0428a940979d029c4d08a91d688df764e1cd97971264167b3e97ed59f40b8b8f7f9dbc92540eca44ebf1df763ff49b672e
-
Filesize
2KB
MD53749b8613a8891b5f938542601d5471c
SHA1212ac648241c6cbbbb5579b1cab5604c3101be6d
SHA256fbc4f155fc36570844928f87b1d7dda07a6ee1a5fafaeebbf28545c7ec584ebe
SHA512fc46eec3f9a2916f16034df17fc695fc8f43241efd507a58bfcf533dcdf4d06e8ec7ae23d69da320893dccb91e897718cdeda66e080d489881748fb12d6f5d75
-
Filesize
538B
MD5dbdb05a3db77e09412a049118372c319
SHA171a985c10305bd76aa778ea49e7e020256ed2c99
SHA25680b849b1a78fe35cfb34683b6aafb7fad808862041004db8a7555b2d1e02dff6
SHA5125cae8839b2c6ef0b5329142e399cdfe1bca491ebf07891689df365fe8ef8d6eea3f9cc92ad6f88fbe5fe50dcce514392a892839c1ba386ac0d01646526a8b245
-
Filesize
538B
MD57389db03e982098c2989d634bb23d6a2
SHA11288b187ad98de575775bbdda9fbf9cd431e61af
SHA2560875fccc87231be3c1a7a4acc183f4ccb50099c8edec8c4bfab4de3196abbac1
SHA512edd4157aaf321abd9ad14cdf20fad627ff6ad7f31ea20445c722e6a1380db49ecc9f8a318b7f55214c94d1e386a2d058bd74dc2bb375ef3b7b34b25386dad86a
-
Filesize
538B
MD5ffef3121ac47bf21dc4dee20ed41707f
SHA136d28e3b62cd4635448f62050639f61e79c8aaaa
SHA2563f625153353055b34a9d84432ad8b4affca20d6a27eb1867d89bd7abfc9f0603
SHA5127aaeddec17e9300ea06d83738b3cb6224d49377577606440e43c7a2127b92dbea069d91eddf29022739d4f414d73ae3edbbc83e9dec5026dbfb69d2fbf48e406
-
Filesize
6KB
MD501a1b99b3db7098cff185c2a834ff118
SHA17948f7f29c2f54d285b1cef59d70f06b59f2123b
SHA2564590229c47adc6b84d72ca142ae1069bcca6769e4314cbe1e5b508e26daad54b
SHA51284a325851256345575598894701069a66e065aeea613a92bbf889a95231b66d54930a461cad95c5b9d1762d1bebf2973440f53f546e9f297df438943bfe0f576
-
Filesize
115KB
MD56e7c7db1979b41575b829a7dc5400538
SHA1cebb0a7edf694c87c642367429dc7586b8601a07
SHA2562c8067628cf2ef010998411e229e45ba44e227de24442c448cf0a3340c5c451f
SHA512c7f2092bb8d5b3368061f5ad723a7a285ff7d8a279f801215f0c37354c929f6b88f0fcf7ef5a5bceff821b295dbc6499e4c1073868b9a74a56f01439ec6a19cc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd