Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 22:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.icloud.com/iclouddrive/028h058oB4b3svYop-aBYKogQ#NPURCHASE_ORDER.PDF
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.icloud.com/iclouddrive/028h058oB4b3svYop-aBYKogQ#NPURCHASE_ORDER.PDF
Resource
win10v2004-20231222-en
General
-
Target
https://www.icloud.com/iclouddrive/028h058oB4b3svYop-aBYKogQ#NPURCHASE_ORDER.PDF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500050759747464" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4952 chrome.exe 4952 chrome.exe 6120 chrome.exe 6120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe Token: SeShutdownPrivilege 4952 chrome.exe Token: SeCreatePagefilePrivilege 4952 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe 4952 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3888 4952 chrome.exe 89 PID 4952 wrote to memory of 3888 4952 chrome.exe 89 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3112 4952 chrome.exe 91 PID 4952 wrote to memory of 3180 4952 chrome.exe 93 PID 4952 wrote to memory of 3180 4952 chrome.exe 93 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92 PID 4952 wrote to memory of 2952 4952 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.icloud.com/iclouddrive/028h058oB4b3svYop-aBYKogQ#NPURCHASE_ORDER.PDF1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d5b59758,0x7ff8d5b59768,0x7ff8d5b597782⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1796,i,47264353312088102,3565761389113335564,131072 /prefetch:22⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1796,i,47264353312088102,3565761389113335564,131072 /prefetch:82⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1796,i,47264353312088102,3565761389113335564,131072 /prefetch:82⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1796,i,47264353312088102,3565761389113335564,131072 /prefetch:12⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1796,i,47264353312088102,3565761389113335564,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5152 --field-trial-handle=1796,i,47264353312088102,3565761389113335564,131072 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 --field-trial-handle=1796,i,47264353312088102,3565761389113335564,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1796,i,47264353312088102,3565761389113335564,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2452 --field-trial-handle=1796,i,47264353312088102,3565761389113335564,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4684
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4288
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:1000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5d4e40e5913968e3428e04f178ed14a77
SHA104d4e00d8157eb9cecbeebc4bbe41c0ef6884a85
SHA25687fe358d10aa9de91a0fe2f817a4e18d53d636b1a847daf3268a07a8fd4e9676
SHA512d0ed127f833aa01ff25e0d80bca3a2a6582d8dc277382453e37ec784e5b28986e96489502300c73cb3c7c3a79d7ab96f037686239943a55b4e32e7e4d28ca5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD575c736aedaeccff4f4cf3b6733d9c12b
SHA1f0eb20ec09d5728e1e7a5a78a3f5506cf78e4aa4
SHA256fd85af246df3c784859f6536df1fab1523f3716e3f570a229240db525bfc26c7
SHA512725de40a119a6bbd9778425a570c12c34d682e407378c745fbdc8c23bcf9f5c632c602837d2032b5ca94a6f07a856c1ff1f130e80a3259428d77fe836b454623
-
Filesize
360B
MD56f381a3b9f65a8e932bea19276c49ac8
SHA17a186f4d0b15685e21c373bac29b22715f81b581
SHA2562f4e919b7d14ee6f24eba9065e0b0478f3b9fa5248261b91b5a6f1936da68eed
SHA512a98d43a0e84e694e1e4207156a64592a5175493078a28cdd89672918e7fd2db92b5f71e0931205c4ee22bca9fe85c3a9398c03afb70b2c82eb8b6eef4e50de18
-
Filesize
1KB
MD59bc3b86387508622681501e33c10743d
SHA11448d4597f8e4fc4e3de8dcdcf0def6a28ea1deb
SHA256db7b7496fc5521951c9a685db02f32d1a830ac99a87588807dbc4a5a896cf9ca
SHA5124e230ec33d94af69a02dbfee2fc1cc253c24edeecc3d013912841a38079de9bd9dc6427fed3d82ff83bd08623bce1bdff7e98b21377d55eab1fd3e7962161c35
-
Filesize
1KB
MD518b8f387b1cecafcf6e4205e54a02db4
SHA10d5abc15ad669a40800cb9894659557fb7330735
SHA2567c47285eabc7294d673cb77b72a6467d938ef16a7fde2d877bc9723fe2e6f77b
SHA5120315b00aef47700e2b8d31c2a7339186784f1b622300fc0bf63b83ba887aaa5eac8164bf0dd480aeb4abe49f353dfe757ce74889edc9d1b66d25d911073ab918
-
Filesize
1KB
MD5ac348ab28f869a343b51f942c68fe804
SHA149816dd03f3c75fdc6cd35a32a5bc2359d4a0269
SHA2563f55264fb41950bf3272ea5c81652d3ea4c3e091c135dc541b09e57b286db454
SHA512eafd026870220c393294b64fa9e7c3b67e732f94dbd95142a6e8c4321799d909fecdffe72e83e83ec253139ff4930fb97c38c6fc33a3528f6edb57a5afefa377
-
Filesize
6KB
MD5a1c4a8fba674e68d07f69672ac853623
SHA13eeae5f6ff38bec425671e5fd9d7aa792f869f5b
SHA256e1da3ab6277990ac943495f761adf4102995983050afc214b012df90828c7b13
SHA5121982d25860b4b24c9fbde22273b83d8bf50c75568c8cca0e56e50949377a618ff5471101b2b61203a255d6c54a8840b151fc010a3db8a7812d997b176be478bc
-
Filesize
114KB
MD56d2e0401e73c555d3d5ae170d3e78d19
SHA1e61c1a25643f6c06e33b60d4de048035420a195d
SHA256c40f1860a75c74f62981cfb8a81d9bb416ed72e02f98a154876c03431b02726a
SHA512742426101776757ff8be87a3035ebeead83fc48a6de6f4a89a69bc70e4c81bc9abf3a64853a3aae717ba70d247467d11d405d7ec4ba8feb6e561141b03916890
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd