Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://jet.jabil.net/aspera/faspex?context=eyJyZXNvdXJjZSI6InBhY2thZ2VzIiwidHlwZSI6ImV4dGVybmFsX2Rvd25sb2FkX3BhY2thZ2UiLCJpZCI6IjEyNDUzNyIsInBhc3Njb2RlIjoiOGY3ODhmZDQ2OWU2ZjBmMWViNWMxZTE2ODY1YWJlN2RhYmRlMmI0OCIsInBhY2thZ2VfaWQiOiIxMjQ1MzciLCJlbWFpbCI6Imt1a293c2tpamFjb2JtQGpvaG5kZWVyZS5jb20ifQ==)
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://jet.jabil.net/aspera/faspex?context=eyJyZXNvdXJjZSI6InBhY2thZ2VzIiwidHlwZSI6ImV4dGVybmFsX2Rvd25sb2FkX3BhY2thZ2UiLCJpZCI6IjEyNDUzNyIsInBhc3Njb2RlIjoiOGY3ODhmZDQ2OWU2ZjBmMWViNWMxZTE2ODY1YWJlN2RhYmRlMmI0OCIsInBhY2thZ2VfaWQiOiIxMjQ1MzciLCJlbWFpbCI6Imt1a293c2tpamFjb2JtQGpvaG5kZWVyZS5jb20ifQ==)
Resource
win10v2004-20231215-en
General
-
Target
https://jet.jabil.net/aspera/faspex?context=eyJyZXNvdXJjZSI6InBhY2thZ2VzIiwidHlwZSI6ImV4dGVybmFsX2Rvd25sb2FkX3BhY2thZ2UiLCJpZCI6IjEyNDUzNyIsInBhc3Njb2RlIjoiOGY3ODhmZDQ2OWU2ZjBmMWViNWMxZTE2ODY1YWJlN2RhYmRlMmI0OCIsInBhY2thZ2VfaWQiOiIxMjQ1MzciLCJlbWFpbCI6Imt1a293c2tpamFjb2JtQGpvaG5kZWVyZS5jb20ifQ==)
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133479512136453919" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4244 chrome.exe 4244 chrome.exe 916 chrome.exe 916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4244 chrome.exe 4244 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe Token: SeShutdownPrivilege 4244 chrome.exe Token: SeCreatePagefilePrivilege 4244 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe 4244 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 3476 4244 chrome.exe 16 PID 4244 wrote to memory of 3476 4244 chrome.exe 16 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 3228 4244 chrome.exe 68 PID 4244 wrote to memory of 1616 4244 chrome.exe 67 PID 4244 wrote to memory of 1616 4244 chrome.exe 67 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66 PID 4244 wrote to memory of 1300 4244 chrome.exe 66
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://jet.jabil.net/aspera/faspex?context=eyJyZXNvdXJjZSI6InBhY2thZ2VzIiwidHlwZSI6ImV4dGVybmFsX2Rvd25sb2FkX3BhY2thZ2UiLCJpZCI6IjEyNDUzNyIsInBhc3Njb2RlIjoiOGY3ODhmZDQ2OWU2ZjBmMWViNWMxZTE2ODY1YWJlN2RhYmRlMmI0OCIsInBhY2thZ2VfaWQiOiIxMjQ1MzciLCJlbWFpbCI6Imt1a293c2tpamFjb2JtQGpvaG5kZWVyZS5jb20ifQ==)1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc62429758,0x7ffc62429768,0x7ffc624297782⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1896,i,11016750246992979317,14454117140556988606,131072 /prefetch:82⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1896,i,11016750246992979317,14454117140556988606,131072 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1896,i,11016750246992979317,14454117140556988606,131072 /prefetch:22⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1896,i,11016750246992979317,14454117140556988606,131072 /prefetch:12⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1896,i,11016750246992979317,14454117140556988606,131072 /prefetch:12⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1896,i,11016750246992979317,14454117140556988606,131072 /prefetch:82⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1896,i,11016750246992979317,14454117140556988606,131072 /prefetch:82⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 --field-trial-handle=1896,i,11016750246992979317,14454117140556988606,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD506c499e69224b6576f00699583940dfd
SHA10f027d0b05610863bd2cd47a0083c43e28aa8189
SHA25692773614429370fbf6d1ea2276ac8b26550632c3973da29a1ab3c6a0cfd85551
SHA512e4ff3ce1417317f6295412905b39a93697633915bfbf0bc89baeb66610b3ef33764bd660be5a5827206a78edb41501e69486fa800e81dc5ae5ee7e3ebdee466b
-
Filesize
1KB
MD59f1a774c0c10b779d13ba86e6eb3eeda
SHA149497820db9ec58e4246b4cda2d3db0b26c06efc
SHA256c43f27c47afb7681ed0c49c4050b1bea8e18870a94554b22ca3020d7a311e80b
SHA5122aa0598fe2d625c2cd33954ff6d89242999857448fd0320db4187e9b18e5bc781085ebabcff090d35c1ec10eebe53bdac4911dc07e739445fbb390e28db2ef0d
-
Filesize
538B
MD54a6f803c57bcbdb0e2e999ef7f4be75f
SHA19782ec345c6a2d0a2dc190cd6a8feb5ce46965c2
SHA25651fd8c29cf04ab626d2efdb4a759edf93be033f3a030e18b9f55ffbbcdd14b26
SHA5123ae6da5125c6f15e6309f069e92ed556393d3ead293b19fd3b8f36843d63256a4486a70e41353927dbf68b16b04b126f475f2c986c7c41c5e4267fc1e6e8206d
-
Filesize
6KB
MD572d02eedc099ed075c02bc7fab1b4569
SHA1cb3d5a2941b68918d892b926597d0cce0dbd6ed1
SHA256adee3c4e6e6d683c8cc46dcf52bf627c9a04fd9cffeeb13fd7d080e0b04fef93
SHA5128401d5b6c949b70b144f205480b3624578fda1aadfb0bac8bdaf6880a7f5ef518016cd40d759ff032df73043178ad3da907c911f6f7df7af2841f7b05f1f7e95
-
Filesize
114KB
MD5762a5a0187483a4389a91e02f3002c45
SHA1a7c13a48e50a94d4c35c6aeb73c343b21a8350f0
SHA256851370ed603b2707cd7f10f3472457032339f2e9841a2d6883b3ab24f30c8fce
SHA5124e6d46721f6cacd7f1b623ff169463b2fdb1e3e21beef5594362469ba56fe32492c0671610a93c796afbf0b8c992874cc4320b6404aa3dec5b94a7f2ffc223f7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd