Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/12/2023, 18:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://icshort.net/clicktrack2/click.aspx?qc=H4sIAAAAAAAEAH1QwU7DMAz9lV0WwYG06tYLUg5dOm1DrJq2AeLoZqYpNM3kJFT9e7KBhMSBk%2B1nv%2FesVyjf2v44nlFIQvC4bp23NLISPNTgcFMKJkPEDFLsV9u7lVxvC7neVMv9K9sBYe%2F3qCyd4loBddZxaELbAU3naW0jxJU1TII5Q9v0QmqKHgbcJEuzGavAoHiwDqdZKq%2F02BTfAkzaSOpHsbjIRPzACx5LeT3mz5zttO1R5Fmcb%2FL8NpZ8nmWzNGVLA23330OHUL%2Bj8kJ2rfqYHDXZ0Gj2gnUFn%2BJIAVllf9L4k80vviA7OGRP%2B0ehvT%2B7%2ByQZhoGPNvhQ48UmCQ4paZQ2oHTbI43JW9QKhKcvnmrfUXwBAAA%3D
Resource
win10-20231220-en
General
-
Target
https://icshort.net/clicktrack2/click.aspx?qc=H4sIAAAAAAAEAH1QwU7DMAz9lV0WwYG06tYLUg5dOm1DrJq2AeLoZqYpNM3kJFT9e7KBhMSBk%2B1nv%2FesVyjf2v44nlFIQvC4bp23NLISPNTgcFMKJkPEDFLsV9u7lVxvC7neVMv9K9sBYe%2F3qCyd4loBddZxaELbAU3naW0jxJU1TII5Q9v0QmqKHgbcJEuzGavAoHiwDqdZKq%2F02BTfAkzaSOpHsbjIRPzACx5LeT3mz5zttO1R5Fmcb%2FL8NpZ8nmWzNGVLA23330OHUL%2Bj8kJ2rfqYHDXZ0Gj2gnUFn%2BJIAVllf9L4k80vviA7OGRP%2B0ehvT%2B7%2ByQZhoGPNvhQ48UmCQ4paZQ2oHTbI43JW9QKhKcvnmrfUXwBAAA%3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133477418485427220" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 212 chrome.exe 212 chrome.exe 4596 chrome.exe 4596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 2972 212 chrome.exe 14 PID 212 wrote to memory of 2972 212 chrome.exe 14 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2988 212 chrome.exe 32 PID 212 wrote to memory of 2976 212 chrome.exe 31 PID 212 wrote to memory of 2976 212 chrome.exe 31 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27 PID 212 wrote to memory of 1996 212 chrome.exe 27
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc01399758,0x7ffc01399768,0x7ffc013997781⤵PID:2972
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://icshort.net/clicktrack2/click.aspx?qc=H4sIAAAAAAAEAH1QwU7DMAz9lV0WwYG06tYLUg5dOm1DrJq2AeLoZqYpNM3kJFT9e7KBhMSBk%2B1nv%2FesVyjf2v44nlFIQvC4bp23NLISPNTgcFMKJkPEDFLsV9u7lVxvC7neVMv9K9sBYe%2F3qCyd4loBddZxaELbAU3naW0jxJU1TII5Q9v0QmqKHgbcJEuzGavAoHiwDqdZKq%2F02BTfAkzaSOpHsbjIRPzACx5LeT3mz5zttO1R5Fmcb%2FL8NpZ8nmWzNGVLA23330OHUL%2Bj8kJ2rfqYHDXZ0Gj2gnUFn%2BJIAVllf9L4k80vviA7OGRP%2B0ehvT%2B7%2ByQZhoGPNvhQ48UmCQ4paZQ2oHTbI43JW9QKhKcvnmrfUXwBAAA%3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1848,i,15489368863717201822,9660772506891134303,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1848,i,15489368863717201822,9660772506891134303,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1848,i,15489368863717201822,9660772506891134303,131072 /prefetch:12⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1848,i,15489368863717201822,9660772506891134303,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1848,i,15489368863717201822,9660772506891134303,131072 /prefetch:22⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1848,i,15489368863717201822,9660772506891134303,131072 /prefetch:82⤵PID:504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1848,i,15489368863717201822,9660772506891134303,131072 /prefetch:82⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5100 --field-trial-handle=1848,i,15489368863717201822,9660772506891134303,131072 /prefetch:12⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3836 --field-trial-handle=1848,i,15489368863717201822,9660772506891134303,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD57ec997e107558c294d3cbb0b2b7e0916
SHA1f8a3377d99a27d7ae2fd8c2f4dff325f5619b6fa
SHA256d910d4de93e6e93d98240bf4873922d2d6e0d1cbc40cdff30e474ec17283d94c
SHA5126136b55c6a7a0cd1cc0f03e1eff6c71dc8bf512174402caed75a00212fb46436dc722c4a0a2cd1286b704975219afe1492cb484aa9094e28e3bb8db16ef92f42
-
Filesize
2KB
MD590fa061367a0c9f5ebb4b1ab611033ce
SHA1f3fccffb75f7d21e8177516c3c82ec765d726469
SHA25680a241851ed7c513a6618be7fd619b89364aaaad8229998a50771fcceba971c1
SHA5124e755006b145e232640018880848ecc7cdb2e58cbb723679ed58585f64016b6f6b2e7bea8de91ff388dba6e845bdede58dcba34d1dd6bb9c25bfd482fb6eb833
-
Filesize
2KB
MD5e130a66d90202ed055b7b77ea6acdd82
SHA11f2fe3a07514c4f507be4ccf15df9f62e7cea962
SHA256b20a705338e7f5f4e34a801a56d06d8d71f34a47abb77b68851dd19dc362faa4
SHA5122f626acb175638cf86968c87b478bfdb3db4a1b801b94d2b28ef11ad1f540c338aeae82f53bef635b375ea42bb85a1de334e62e865e9a8edf74de82b4fba1991
-
Filesize
707B
MD5771e025cfdd5f101075ceb75685235a2
SHA1b8f32f75c9b58d605a52b97b28af218752abbda0
SHA2568c95a6c73bac12baf25105c64b950b92b2901f07fd058af196c48c2784634425
SHA5121f6099c6d3414b6b32ac200e03ff23dfe5a6e29bf0b93de1596501bab4f93334624b3b930da45483e72f6dd7a454ba810904f0c8e5824a9966c6319da5e866b6
-
Filesize
6KB
MD57cb06e0e155bed63bfb17d8500c06c11
SHA1262cee70a473eab97ef194014b232f8f5d3e78a5
SHA2568f0f76bbe9a48a710fbb97a364d19f4da045b9105d80cefa89142d0b3540dd43
SHA5128dd6a140dcfb499556702ad1e104b0ed577a65037402260655a60fbe7e51b755ddd450af79af7515c76accaa59be717c3a05f49204ed1dc071788ba58c392842
-
Filesize
57KB
MD5d0f6621326dbbd606798d04864888db5
SHA189d21ceec682ef4a74ba58a1a1fe82c7821a56ad
SHA25664670c3068c9c33831217c011028a66dfd32c0f3c058d2c72874ee5027b287b0
SHA512446c6390c05e3bd2c30ec099e65f7475c2706c5d6288d32c4c1a1097cd8ad9f619e088d7c7a6f31df9724e686f40c0aee14e7ed20c8100a3563439710fe061fc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd