Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
601s -
max time network
507s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
20/12/2023, 02:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://securemailwfa.firstclearing.com/s/e?m=ABDRdR3tY6hmAbpkfbbcdX3p&c=ABCpH5Xr1ekDHe9PUPKJtjbf
Resource
win10-20231215-en
General
-
Target
https://securemailwfa.firstclearing.com/s/e?m=ABDRdR3tY6hmAbpkfbbcdX3p&c=ABCpH5Xr1ekDHe9PUPKJtjbf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133475132865496973" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1688 chrome.exe 1688 chrome.exe 2692 chrome.exe 2692 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1688 chrome.exe 1688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeCreatePagefilePrivilege 1688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1600 1688 chrome.exe 72 PID 1688 wrote to memory of 1600 1688 chrome.exe 72 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 68 1688 chrome.exe 74 PID 1688 wrote to memory of 1120 1688 chrome.exe 75 PID 1688 wrote to memory of 1120 1688 chrome.exe 75 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76 PID 1688 wrote to memory of 1408 1688 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://securemailwfa.firstclearing.com/s/e?m=ABDRdR3tY6hmAbpkfbbcdX3p&c=ABCpH5Xr1ekDHe9PUPKJtjbf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffafc89758,0x7fffafc89768,0x7fffafc897782⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=224 --field-trial-handle=1780,i,2495963655775558464,3656745350208344702,131072 /prefetch:22⤵PID:68
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1780,i,2495963655775558464,3656745350208344702,131072 /prefetch:82⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1780,i,2495963655775558464,3656745350208344702,131072 /prefetch:82⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1780,i,2495963655775558464,3656745350208344702,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1780,i,2495963655775558464,3656745350208344702,131072 /prefetch:12⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 --field-trial-handle=1780,i,2495963655775558464,3656745350208344702,131072 /prefetch:82⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1780,i,2495963655775558464,3656745350208344702,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4428 --field-trial-handle=1780,i,2495963655775558464,3656745350208344702,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD56262eef1ec7d408f93e9dc3e30c1a97e
SHA18f1fdd7cb82bc42ecc9f3323ff6708e23673c57a
SHA25626b5191a6c62f26345761e19a547bd5d1efd1b5fcb005987d0846e02a409036a
SHA512d4e414c53fef44f73ac0ed2f92a06c5a315eea7339c758076545dee60ddd64d48afad37311881c6cdc566e7ac56cdfcc30f3e7d27adc9bf4add85fabf533be8d
-
Filesize
1KB
MD56905860b02d4a276661b955e662a24a1
SHA1c40b04a2059c89adad8a929d0b01e8e216709379
SHA256c7f90e097717d9f5a786c1d01c8aca8c21c9ebafd415337a04aae12c40fa49ea
SHA51226f2881d32497e1ef23be10caafa8746ae0523dc123bbf982bad0e6e634f6c1f30f0cd1bb1abfb66f90ee0e29b2e943b751afa1d37ef0d4f52dfe1cf7b8ab776
-
Filesize
538B
MD569ac8d7363491d2af84a49bb6301c6cd
SHA1a8e15cf1a52286468baaea7306ba6ccc9347164c
SHA2569972479a18dc43ff4974b1c3663fecaf694b6b81209d7185c3b173970ecd044f
SHA5122a94e7ec05dec11838c83916b0212b5aec83282049b7e8792f59f9d39f4f65b55a0a73a2ae620424c143d881f78b5b8fc1e5a02bf54198cd7c3bc833ab3fb737
-
Filesize
6KB
MD5a501f42d6139fce395b71c3a3cd322a3
SHA1c1dbc542efb92c1f055aecc6df70949dd7434da0
SHA2567a46d570537b4d5a2f77cd3316058ed15c52937c75d74f09728f895cc45d736b
SHA512203d23f0b852fe4970bbcf9885517b86ea5b4caef4a6cc5c1f35fe6cf4a3e1263964867dcd48ddc060805fcd2caed63beeb657e6b18da5257bf3875f40c631e3
-
Filesize
5KB
MD5ee3fd53074a8599be8194f71c6bf943b
SHA12235db7bba83ce1452078cb9063f5742cd3cfd37
SHA256083371f19b0523758a94a120532e4312cbb23c9b92e3145d2f7009462d41cc71
SHA51236d8324145a267c551890ccb46f04d19f94dc9b48dc8fd561bc99be230ef7ef483aa82e18cf07f5c6d381578d0aa5d35101e9e02e4d139328745c929d7df53e6
-
Filesize
5KB
MD55f03e3aed15419ca4942d7b4c6b13088
SHA1ab4b8f0cca2fbd670e0a85322bb05627254abbb4
SHA256efcd99e2f4509a1c4791e163d6a4e6b1752b412a771bf821eaa3a21040c67ce7
SHA51205376ddcaa7314d376deaee0b55f1a35e04f118be5158df1cf2d9cbc0d6e155ce84a8da670a14cc8dfd0a7a455c7d9b36afe9948740b985b8ff3623f5cb2e088
-
Filesize
114KB
MD52200e19917dcd92aee28a8b2ddf84800
SHA127d273b6f08aa44246304dca67ec2a213f548bb5
SHA256bd7c247d79cf04c0ce597320d94cc0c8b927e79b8e840dea3f04de03d45414b5
SHA5129b2494cd92dfe555003695181b64ff022a9d52637797eb172477907b8aeaefb3a4ae4458f54e8f8fea1f0f40a29971b2353541ec578c4cd95d43aea6ca9173bc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd