Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 19:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://m.tiktok.com/passport/email/unbind/index/?unbind_ticket=WykTWdCfdqBUkPhufAypFxJqXQSUtVtg&aid=1233&locale=en&language=en
Resource
win10v2004-20231215-en
General
-
Target
https://m.tiktok.com/passport/email/unbind/index/?unbind_ticket=WykTWdCfdqBUkPhufAypFxJqXQSUtVtg&aid=1233&locale=en&language=en
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133493024446688364" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 4664 chrome.exe 4664 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1604 chrome.exe 1604 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe Token: SeShutdownPrivilege 1604 chrome.exe Token: SeCreatePagefilePrivilege 1604 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe 1604 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2260 1604 chrome.exe 15 PID 1604 wrote to memory of 2260 1604 chrome.exe 15 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 372 1604 chrome.exe 33 PID 1604 wrote to memory of 3088 1604 chrome.exe 38 PID 1604 wrote to memory of 3088 1604 chrome.exe 38 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37 PID 1604 wrote to memory of 888 1604 chrome.exe 37
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4f389758,0x7ffb4f389768,0x7ffb4f3897781⤵PID:2260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://m.tiktok.com/passport/email/unbind/index/?unbind_ticket=WykTWdCfdqBUkPhufAypFxJqXQSUtVtg&aid=1233&locale=en&language=en1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1876,i,16684227742713130766,13622709821569936481,131072 /prefetch:22⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1876,i,16684227742713130766,13622709821569936481,131072 /prefetch:12⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1876,i,16684227742713130766,13622709821569936481,131072 /prefetch:12⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1876,i,16684227742713130766,13622709821569936481,131072 /prefetch:82⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1876,i,16684227742713130766,13622709821569936481,131072 /prefetch:82⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1876,i,16684227742713130766,13622709821569936481,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1876,i,16684227742713130766,13622709821569936481,131072 /prefetch:82⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 --field-trial-handle=1876,i,16684227742713130766,13622709821569936481,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 --field-trial-handle=1876,i,16684227742713130766,13622709821569936481,131072 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2588 --field-trial-handle=1876,i,16684227742713130766,13622709821569936481,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3392
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD57f7b2c5abaad1dc0236e58ed4501de96
SHA1bf496bd3b8f093c7dec8167c397c5820fa8c3449
SHA256d6faabd57996c5be19dd9bb57478fdc9db47f9f8f9f5ef4122937a18f3398944
SHA51288ee31b607e9166a976b65205ffda428ae9e611c3b535db7da21df6f890255fb9a586a83a121248fa203f86774beffd34f98144b42c4b8cb84cbc65eef776216
-
Filesize
2KB
MD5ed8f30dd64c3ccc2dbcf14f80a955241
SHA11e8a360a96ae08329a0874e2964ce382a62f295b
SHA256daf9554223253059877084c74dad1f6fabb1b5cc9eae9785f55be70f7be954ba
SHA51263adb88b94899979d28b4f360070f21d6f52383d9801430df4fc4a648f337b90f712e425279d46092d81a5d734b42205dffb1070b5b74095a36542a02ad91c05
-
Filesize
539B
MD562a4fada4d024c1b1028ea61a5ab7bb9
SHA18203820e385cc678236c558342a9bd5894d908bf
SHA256767c0138e7d36554041a48a336d935210441b921029759d921ac070341ed053e
SHA512753828abca4d95289faf16799579c0fa9480ef870f70a491d5e20d8c66dd70137da7f62d2ad5165f3745b356bd3e1a0dcea77c9eb72742af6cfe902ae08a931a
-
Filesize
706B
MD5de96ee834deaac52d6d0f7dad8714be2
SHA10f16a7e3aa7e45a6f4643ae073c0586d3a5d4493
SHA256714f8c7751924b988e7aba36f90d4d08283f3bcc4bccd241d32c3d0462bfd863
SHA5125df08419e2f60093e7d540dc414f5ecc1a516953ffd6e1b512f97c32625e51e702df27237e22d7fbb34ebb8f6b80e13f73bc333370bb74a6dd9d543e0dfe01b6
-
Filesize
6KB
MD56aea4b155a8055dcd5b666d1fbba9031
SHA18e428a03ce297b9e8362951c2423c0c2b30280d7
SHA256537611164c94072e8d6cd6e8d880eec1c23005d46775e90e432ea8f25eac369e
SHA51297de7a45cf3869a01817935522761a3e327b694d0a8b15205769300d82ebebfbdee4eed02eb47567f60ee046eb7c10c711200aef71c843c332571e8a8032a140
-
Filesize
6KB
MD5d7aa6e4c97a575d5408be114f09b832f
SHA1a8a78508db156f5cdaff11fa86bce047d5dc30dd
SHA2568004f9ad827242d7e96c92a93f4a00a9007575e31a7d4068062559fd04cc9732
SHA51251d474a4cbf575043c33ceee47766b40a218a5deb59f6d763cc17fa1e0bd311a78583a2685a36b736d7f1f81d09c0644798563461f9197afd4f762c8c883f08e
-
Filesize
6KB
MD506881f4bccff512fa7eef63f1dd6783e
SHA18bbd54f8504f20bb76eb960e6c88063492d75103
SHA256006bb88521c9bc1b08a0cae5ac55540ad51f2fde41eeb265424923ee48993cd7
SHA512b8073ffcb9c6be89e6e2bba0ae327e1a48488b4c051f0919ec915474efd55b723a980b730d339eea9ed78e5ab25a217324bb4189eda4f655f1026af3ebdf4ff0
-
Filesize
115KB
MD55535be9ac45f7af2a8d72a36aa8b3ca8
SHA1664257ff5699f9dbd51b40b35c597a4d8f87c184
SHA256a776f0918bc5d37b630868cc754b11bf210f7f7f718ea71862aef9057f0e5476
SHA5122fb34c36ad2d69ecab88755091920bc48dab35cbdc2b4a90bbc8c8ae2055c5ac8f60a19d3ae5382f3b43ab9bdef9422683c4b3bbe875511d7463bac4178ec6a2
-
Filesize
115KB
MD560c71dc8c4607ab17896388530aed699
SHA117eb2d6b0b4c638c3ea5323b4a05dd911f8aa218
SHA256ab1fa385f30a19d30cae8998d0c8e8f665eef6d0eed087f1d458c7bfa7138c7e
SHA512cd708415d8927d9e7168e2f89763827c1a7cdc42bb91c5f00d37e3d43853edf275851da9373e2e7d092dc22539c269c62bb832ee118e451508aad9aba730cb33
-
Filesize
116KB
MD5246f877e164543d503f951230c266aeb
SHA1a95d3b7fe8a32cf718aab7d9e44587cd2c99a1e7
SHA25636d366a3909c92e677fec8555e94a3cd29ddd918d84a856e53812540b145844a
SHA512b954088a168a0d27157f8d8c3e8cf026b791ab89d1f3b093f134a08434a71c323d5b03b864fab97a4d62158158ed68069083a340d3b6f62c5f0a42fde2e210b0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd