Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1795s -
max time network
1687s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 23:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.subsviip.online/M7TheOCnlI
Resource
win10v2004-20231222-en
General
-
Target
https://www.subsviip.online/M7TheOCnlI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133491471166957555" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe 3932 chrome.exe 3932 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 3228 1456 chrome.exe 85 PID 1456 wrote to memory of 3228 1456 chrome.exe 85 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 4284 1456 chrome.exe 91 PID 1456 wrote to memory of 448 1456 chrome.exe 92 PID 1456 wrote to memory of 448 1456 chrome.exe 92 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93 PID 1456 wrote to memory of 3916 1456 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.subsviip.online/M7TheOCnlI1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e8129758,0x7ff9e8129768,0x7ff9e81297782⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:22⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:82⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:82⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:12⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5116 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5300 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5280 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:12⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:82⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2496 --field-trial-handle=1796,i,786650084833940288,13059565827226847590,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3884
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4952
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:4768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648B
MD59e608d31a01d79f5431190c6f7ca8142
SHA14f61fafe88d21e27def4c40e00b3ecb9f2e744ed
SHA2563bb2e11840468c710ea0312eb37deb05476ca27bdf2ed9c955fd1dcf6fda0192
SHA5122b8f123646861e92ade0c1069d465bd731c04683aeedcfb534a2669300a2b0356a3dd22352d42c5b22d6d9de99fa9aae70904990c8747c6e39112602a8639890
-
Filesize
3KB
MD52661d44d1c216fe1570a8c8e04d75383
SHA1219d708cfbae80e02580fcd38ca2fdb951f7665f
SHA256706788874a543a8401df10849c82547e1ec8ffd9bcc9dae374caa976d8558bdc
SHA512f778b6a9c66b5ce17e0776e165a75de608e408e03510cf610fb3da096ec16c8d64559224e7cd78b714af04bfa8eee6e1fefd7214d1762bd0e2ddf0110b53fdba
-
Filesize
3KB
MD560144833a402808c6721c843f24dfaba
SHA148ef2fec22acf2914ce5a119f97a30b3d2674b48
SHA256c150b4235ac4e2e4cff361fefee282be5f3f66b3d4c48e4c0e03c8e73f0e406c
SHA512216f52481bba1315e21cf866754e4d3bd87226efc2a9ab761fca4471efa6855a0eae1d874f6c7ca4407f21d2b59615dbb71ac8c063b7b2e04090f0748b4727e8
-
Filesize
3KB
MD5af9ca877cb110eb835ba378fde51185b
SHA1d296c27f894b9130f9a3bb3c31db2d733fc563e3
SHA25642578bec5be2dd0b5a7b98f5ba8631d85bb424a965728bb9be81d76e5599f89b
SHA512aa7b972a2ca42c5843606138091b3b613be0211322b5d1c8032ad997c358ccabddf04b307e2ad54f07d7c855c0b18ba3a9a9067512e48c5573e032b84b4839d4
-
Filesize
1KB
MD580f6d9df5ce33db058cc0b3f0339c4a3
SHA14d0f4496826ed8eb57eabf08403e84aa0430207d
SHA25641c53cca0d34ed003e7c8b4aeed080999f2e8e7a7d36849a7a2fafd9b6e4a8d0
SHA512cebca037b730edd28bdf4b34dcff4f834420fee83a59225b78f41df5f61108c0a68dd7cb8204d168466dcd3d3d85cb38aeeafe5ec95ad85fc7b6ce6175c76751
-
Filesize
6KB
MD5efb5d091bb7ff19507a450fdb1e6ad1f
SHA17737746369b10881973afd4b66cbbe00628a82b4
SHA256bb55212e6e32035fc64292d865f22d42ca2c951d4ecf44e510e36f132b637791
SHA51282e470543d988948f14fb586ce0489ab2054d63bd99174d70e4d11012fe1c39ae5a8a8e54d4206ae53aebfaa126266c7546f966d499d85d5677efb0775870050
-
Filesize
114KB
MD54772de7311b05488828ab5e5f684ea52
SHA152a62546ed4df91cf1fc4a08b0d88d80fd6de322
SHA2565049d21697cdf65399c57d7824d8040c554215efecd8b39da3fa9ac6930b745d
SHA512125c77fec91dce5ceaf322810d848dbf04a005e01bd66d76318652793ee75631bc27190ce65cdbc555f10ce1c4e4ffaf4bfd57ad2b9efbd125d6b90e78b9f3dd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd