Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1799s -
max time network
1686s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 19:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://portal.ku.edu.kw/sisapp/faces/login.jspx
Resource
win10v2004-20231215-en
General
-
Target
https://portal.ku.edu.kw/sisapp/faces/login.jspx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133496464199839473" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4560 chrome.exe 4560 chrome.exe 4084 chrome.exe 4084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4560 chrome.exe 4560 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe Token: SeShutdownPrivilege 4560 chrome.exe Token: SeCreatePagefilePrivilege 4560 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe 4560 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4560 wrote to memory of 448 4560 chrome.exe 16 PID 4560 wrote to memory of 448 4560 chrome.exe 16 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1488 4560 chrome.exe 63 PID 4560 wrote to memory of 1000 4560 chrome.exe 65 PID 4560 wrote to memory of 1000 4560 chrome.exe 65 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64 PID 4560 wrote to memory of 1260 4560 chrome.exe 64
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa73ba9758,0x7ffa73ba9768,0x7ffa73ba97781⤵PID:448
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://portal.ku.edu.kw/sisapp/faces/login.jspx1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1668,i,17936107175993192010,11298061275324714409,131072 /prefetch:22⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1668,i,17936107175993192010,11298061275324714409,131072 /prefetch:82⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1668,i,17936107175993192010,11298061275324714409,131072 /prefetch:82⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1668,i,17936107175993192010,11298061275324714409,131072 /prefetch:12⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1668,i,17936107175993192010,11298061275324714409,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1668,i,17936107175993192010,11298061275324714409,131072 /prefetch:82⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1668,i,17936107175993192010,11298061275324714409,131072 /prefetch:82⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3044 --field-trial-handle=1668,i,17936107175993192010,11298061275324714409,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4948
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:5476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD58d3fe6f56b623c17a8bf4c08007c8b8b
SHA150667706f5d3ff8d3c9c04f99a45de6de40fc7cc
SHA256da8090272567bdd962cfba05fbeb046c63cb39914e301af38dc8a12430656e4f
SHA512863576e32738ef8f413369513ed9a9c0329a6df13cbf7aad05854d789b52dd3cae84f5f0997435adbb401df471e55e2bb5b5a8cf9c3bc9a0ecdeb0dbc36ca6fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\482cb584-f476-4a66-8917-370f4cb7873c.tmp
Filesize1KB
MD5fa334f3969c41daf567dba025f53954d
SHA16ef4742e81fa87a24974d7304267885cb95ea5eb
SHA2563449c749684cd51fe67b286c9a37186b52617933c1c95f8ff09d27d152a3b4d4
SHA51260f54ebbe7cb5b8e6f1cf17f37bd42da7058293bba0cabcd52d6a626e50c924b584fc555a863a523145ca1b924a57d844050d025a9357217bed3c79acfeed201
-
Filesize
1KB
MD5342a3d2af2f3cb2d3c60f1893790ed03
SHA147417cec70019c68f6b5ae9ea38f36f86bbcaac2
SHA2566398610104bbc5eb8e76552bfd8983ba38a00932fdd4b4d08aec520942aeca3a
SHA512c6f1ff79d73e63e33cc692801a39581cfb96aa31d95df7ba3a7a84f4b48d6fca12a636c0a3a53d4b300fd77fdaa426931ceae2cd8e5a517d91c4814579b5cb6f
-
Filesize
6KB
MD5728aa3f877e564b4c3358f56fe2c0a7e
SHA19dec216c85b97db7a1f9255b070cee7d8904de00
SHA256b97bc7350a495b446d1651546a9a81549f545319cfbeaa362c6941db1d7f8d7b
SHA5122cc9bc594f1963902eeb5e661e32a7e40f7268ae1da1a1b4489483bacf118c6d22806b6e0e14ecb941637cfe94da7220237a1840000769316c5b45dddd66d667
-
Filesize
114KB
MD53a7a9856d82cf96d40ce9a726af04fa7
SHA1ee0069c9dac629ccd21ca5199dd8911f86fa9789
SHA256a4d30e04a6916b09cfa7572df9c68c23f2aa3df2424883181893c8c6f9cae0c0
SHA512baf4d10c15bdc0b8c7bac9e97a15aa05e54fb82702d85c63157124e76542c9109b544d79d9268d0559d9ccf983ae2ef8fc2df013ae404a15978f80eaa279b6fe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd