Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 18:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://calendly.com/pangeatech/30min
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://calendly.com/pangeatech/30min
Resource
win10v2004-20231215-en
General
-
Target
https://calendly.com/pangeatech/30min
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133505087971383397" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 332 chrome.exe 332 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe Token: SeShutdownPrivilege 332 chrome.exe Token: SeCreatePagefilePrivilege 332 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe 332 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 332 wrote to memory of 1316 332 chrome.exe 57 PID 332 wrote to memory of 1316 332 chrome.exe 57 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 2032 332 chrome.exe 90 PID 332 wrote to memory of 948 332 chrome.exe 92 PID 332 wrote to memory of 948 332 chrome.exe 92 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91 PID 332 wrote to memory of 2948 332 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://calendly.com/pangeatech/30min1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf2159758,0x7ffcf2159768,0x7ffcf21597782⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:22⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:82⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:82⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:12⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3888 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5044 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:12⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5188 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:82⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:82⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4004 --field-trial-handle=1808,i,16145757053682430232,11292917116068947352,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5c445ab4315d0633d446998c80764cc36
SHA147d3dee9845cc6e29b6771dd6560793b8b93000e
SHA2565635695eeb70b51c449aea7a5bd3c9699c3c28c64498fb7fcb8173aad45d7242
SHA51283a32ffdddf3ee56e89f232c8d05a4b00265895b0e41d13700f90fa389f0bf3f112c291c24c3819751803322b11e2ff866971d835d601672b36818c4e099bff1
-
Filesize
336B
MD5b6eb08eb33f2f7e280e1bb66af7603a0
SHA19a7be5da24b2bb2f51a84153b2a72d0e94d8fdfa
SHA256f085bcc7747040c890cf11b4d39437f076b243d49a232a72b141f4607973d76f
SHA5124cc8097175e65af73621fb07d893313481879974e3cecfcc569fa24e6aaa21e5cca349b96789e1a2a1ff307011d675fa27bfd4241694b17b84e9246982de6dff
-
Filesize
2KB
MD5472897acb064af23e1c28060b5879055
SHA154bc2433e2c619f1e1482863f117b6e471335085
SHA25679ea3c4ecdc8d3bee76af99545c1a31208d08062755e1164f749a5a6d29383c3
SHA512e1e1cb93904be42b33042d305387731857576ecf09c2893798ac949171e82aa14283d0eb6d4898302c88460b26b0efa5116545fbd1c36d81dcd65cb41e407edb
-
Filesize
1KB
MD5b460eb8e1863545a29bc33c750e39f1b
SHA1422708b278f0a27caab93c262669dc8a142a8344
SHA256fde2fdcace16f39ac6ea1a33796a9ad67723490e1784925e56d2fbcd961bf38a
SHA512543c9104f3255c93aa6f2973ce3721d2b9cce8e3b37f21fc7bc7043702af1b5e444ddc174a9ff64dff5f3eaa052ec34abd811a92e017dbc59b6a80278fd914f4
-
Filesize
6KB
MD56f5422b6eb65c57e35df860f63f32ab7
SHA1412cefd8277113344eff905b1d73f5818cd688d7
SHA2564e676099838186ec4d8ce1e48cf749186ffc2cd14ae3645b322dec0c546b1f6b
SHA51279d3eaccf1f8438106874f3a6fbd23968bcbf3f8da4c21f96369590d93bd22c697112c6c562739849515b620f5c8d2d7ad17ed0be98f47abff5fb32accb4d8c9
-
Filesize
114KB
MD56580ac3815f05671752c3be8319c3df8
SHA192552b3b44c572bb99b3909ae543ba35d5f408ed
SHA256cf6bf3b0fe83d8395f8e3b9b40f35053fd15c348242619f0bb121d27b1231071
SHA512e77cdc3bd7e4594be3669d7d383d6e25c7536541b53e68154526ebf71e416a158359da3ea0ae51c4538791cf754a017488a811fd38ab27abb974029c436be3c9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd