Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 11:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://williams-bar.com/#menu
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://williams-bar.com/#menu
Resource
win10v2004-20231215-en
General
-
Target
https://williams-bar.com/#menu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500509719885373" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 636 chrome.exe 636 chrome.exe 4672 chrome.exe 4672 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 636 chrome.exe 636 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 636 wrote to memory of 5040 636 chrome.exe 86 PID 636 wrote to memory of 5040 636 chrome.exe 86 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 3852 636 chrome.exe 88 PID 636 wrote to memory of 1460 636 chrome.exe 89 PID 636 wrote to memory of 1460 636 chrome.exe 89 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90 PID 636 wrote to memory of 1520 636 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://williams-bar.com/#menu1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa73e29758,0x7ffa73e29768,0x7ffa73e297782⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1888,i,5161227697528043039,4769690091778846437,131072 /prefetch:22⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1888,i,5161227697528043039,4769690091778846437,131072 /prefetch:82⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1888,i,5161227697528043039,4769690091778846437,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1888,i,5161227697528043039,4769690091778846437,131072 /prefetch:12⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1888,i,5161227697528043039,4769690091778846437,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1888,i,5161227697528043039,4769690091778846437,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1888,i,5161227697528043039,4769690091778846437,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2824 --field-trial-handle=1888,i,5161227697528043039,4769690091778846437,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD52ae963e5b4503b92954de746eb997993
SHA13e44af51c587086a7d6499017ed38082ca04d0e9
SHA2569e2a511b548f1893094091a188c8baa6729968fcd4d0f8fb83e34a65c039d0e7
SHA51209bd6eb2778542199e0483110490e20b53b0fe92078bdd49b0f3c73da058fc16e4252ebc3534b142ad336b805a464c201ed6504e6656a78e58b1c4ed3dda9478
-
Filesize
1KB
MD5342a3d2af2f3cb2d3c60f1893790ed03
SHA147417cec70019c68f6b5ae9ea38f36f86bbcaac2
SHA2566398610104bbc5eb8e76552bfd8983ba38a00932fdd4b4d08aec520942aeca3a
SHA512c6f1ff79d73e63e33cc692801a39581cfb96aa31d95df7ba3a7a84f4b48d6fca12a636c0a3a53d4b300fd77fdaa426931ceae2cd8e5a517d91c4814579b5cb6f
-
Filesize
1KB
MD51168467c4547921b5d6596480e70e3fc
SHA1b92addff3eeb1677beb7969042f0f8358d4d4fc1
SHA25664b3e96017f656e9ad723bacefe5905a957dd5375a86a798e0fbb6a5b43cedb8
SHA512240a57f77e918c39dd597d1c7e22f0404f27283e819a806906c6afa251e9802853a2ea8ced5e14e29b7859e3fef8d08ca7e7b952dc040f79f36006d3113015f0
-
Filesize
6KB
MD5a94014763fda877d66e14e0dfc1ea7d3
SHA1a4432cd930704196250f040961ae7b1cef2c421d
SHA25675eaf4d851f6f6f4b4f7e63bfb27db9af021b835ed457697184d750d77cfe600
SHA5122acbeb51881de1065168f7f5c3d73191e80abfaed45635d947965e5c5456d0525c36f4ae8baee9c870fb0f3e531f0ef52ad826df8a194388b3b4f5c082d606f0
-
Filesize
114KB
MD5805d9bd233b38b56c1ecfacff1555275
SHA1c5cb7825af271e5bc1ab084dbce970ada4040f96
SHA2566e4efc7b0a1e1de7ea2716b5a9bb2ef767f436d6e2094cea3b275574dbd02b50
SHA5123189c8f8480e8c90facc3f21a2b9d8bb0171de9ba7de2b99a7b8d091c14c73757a0ea59357aac84ca8d5a198f9b027fe207825a0e91134abdb0da6a65cb4740b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd