Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
296s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
27/01/2024, 11:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://oilisallyouneed.us9.list-manage.com/track/click?u=90b3ed01da0234e12e3009014&id=bec673f151&e=7e8e7f6a04
Resource
win10-20231215-en
General
-
Target
https://oilisallyouneed.us9.list-manage.com/track/click?u=90b3ed01da0234e12e3009014&id=bec673f151&e=7e8e7f6a04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133508274585588088" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 224 chrome.exe 224 chrome.exe 312 chrome.exe 312 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 252 224 chrome.exe 14 PID 224 wrote to memory of 252 224 chrome.exe 14 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 4488 224 chrome.exe 78 PID 224 wrote to memory of 988 224 chrome.exe 77 PID 224 wrote to memory of 988 224 chrome.exe 77 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76 PID 224 wrote to memory of 1920 224 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff86f979758,0x7ff86f979768,0x7ff86f9797781⤵PID:252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://oilisallyouneed.us9.list-manage.com/track/click?u=90b3ed01da0234e12e3009014&id=bec673f151&e=7e8e7f6a041⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1732,i,9482011872923739262,12143790569833888748,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1732,i,9482011872923739262,12143790569833888748,131072 /prefetch:82⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1732,i,9482011872923739262,12143790569833888748,131072 /prefetch:22⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1732,i,9482011872923739262,12143790569833888748,131072 /prefetch:12⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1732,i,9482011872923739262,12143790569833888748,131072 /prefetch:12⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4900 --field-trial-handle=1732,i,9482011872923739262,12143790569833888748,131072 /prefetch:12⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 --field-trial-handle=1732,i,9482011872923739262,12143790569833888748,131072 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1732,i,9482011872923739262,12143790569833888748,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2412 --field-trial-handle=1732,i,9482011872923739262,12143790569833888748,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:312
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936B
MD5c86fdd800a6bbbfb795260dd3b5f4a8a
SHA1f9bcb96cd8d4ee96ee9baa1a9c9f2f828f484a81
SHA256e8db82bfd25d325dfcc9a2bb58786858e38c62ee6808fbb803fa9d164973fff7
SHA5128f330b8722a5e0a16ff1751f02a92927d7090e297c1ae488bf2ace96d80ff766648971508259ce25b73916fb184692c93871091249480d5f8aaf72d21addf94c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\19ab2d1f-4898-4554-b604-7105c6619d52.tmp
Filesize1KB
MD5d647387ece5f4add30b8a785215bdd43
SHA1db86679a68f5baf361933c0db8c17193a1ef31b5
SHA2560053a817f70ebe38f642728074a8f4704bde3f58811e6fabf31a190c9635f6c1
SHA512c034aef3d7e08ace2b4b86f090313dda479fdd70d71b2168f73a91f33b0d8ff9569d52c6d75720d60dbe21f906c5f203b46c40abc170d32a6a684e083c79a10e
-
Filesize
1KB
MD584e25bd60aac6e26cb48e979c738daa2
SHA1c101a67683fb106351d095c985fdbda3f0a9ebb5
SHA256a2e03d56e759824d9d417dd50fe8b8c9b799357f6985c54b284751fb07e6acdf
SHA51291f98324f2eed738b68cb6e98a9e9b1b85a82fc90672eb830cd05b611b100f81870d47828c004b48f9aa3dc62b5502ebe3b45dc9c70a83be72ca49bf7d6fc5cb
-
Filesize
1KB
MD556a0db33fbb84dd496bdc27186be4025
SHA16886d6e81c42e71da2ed4745a63752acee140fc1
SHA256476ef375c658ea593754f59abd21f47f41d99965c9c74ef275181d8911979a5c
SHA51256bbc7d7d2ff3767efb2aa90b6dc86bb8ee942948b4a528fbea0ae8686e895f628659b59ad096db5b82838c39fc9d5e8d283c5220b5c2f54281db37073b9e8f1
-
Filesize
1KB
MD5396e028a38b67b2f1da3f9d620564ab6
SHA1554d2737e5ccd0e4985ab7ae25f97f4e3484d52a
SHA256d566fb7bdf5dda9ed80bf1522f06e34b632d602adefb053421db242a00b2e462
SHA512da4de1c0fcb734f299686eabf7d9df0094532bf3cd7387c34558454cd0ce840ccb2a7405f8247b1867402f56f44130d4fed9e7c8d951c7e4809440d316d5d061
-
Filesize
6KB
MD56c072b13d99c2ce1b8dc6e15afceca3d
SHA177894c88d26ba2513d6f255b9fa1e50447e08cbf
SHA256344ef4dbb7223deafddce64575d91aa34e72cda449e69c23fac73c207820c8e4
SHA512d8891b93fd85f9b74e4c7f8141806b317c90b9c60f64c02bc35487dd46e72acd3bc49cf2dd067e647884cf096669418246c76d996a7fcc1bf242116af1f946c2
-
Filesize
6KB
MD5f2aa2c10095b886c193503f5d6730b3d
SHA1094f2e95abbd7648397fdd64744488994d5dbcbd
SHA2565fb2ebf656cbcb498c1efa3a81d5ea6ffd02f1c65558344a2e2b929bc933f5ea
SHA512245c013eca3f3701b29fb450176a9ac09618a5539a7d3642d78d27dcc570ce632b96e8dcd564bc2d8af4c072d23bfa3eaa3d6ce1d04c6fc3a040b0a8f49c0af0
-
Filesize
5KB
MD5177750d140babde914028dfeab5145e8
SHA1d55020eff1ac886ab0b89c007736606530048319
SHA256579b58d1b1661fb6e59965ce87c869cf5eebbcedd50adfa506756b34e21d5044
SHA51203b18de11d6cbefba11260527c271b3e13e37646da722778dd5b81496f3522bc4c7b9faca2ae307d4d7791f77b7ccf690708c40cdde210100b744dad58ed17d5
-
Filesize
6KB
MD50e3888c9bb30c9c81d8ba1b3bea87e4b
SHA17a9c4853b53d328156c6113f76ccfe52e29694f2
SHA2560db79446e69259bbc33d93ba744cf7f48af172de4f73651c391fdc4b8c19d519
SHA5123eade7f12dcce00b404b7d92ce32acd3e1d8cc2f80635fddec05cac7fe1e7c577729ba70c47104e8114b3c67bfa25cd634d54e51403e5eaf2510f58005c913eb
-
Filesize
114KB
MD53b1638cbe19f9ac15e9603a0e42139a2
SHA14e4dff19fc9bbea67a067d5a375bfeb148face3b
SHA256cd0c43b4aabf05122da38a7f616c545f5a4e54b73db9ebbbb0cee9c665c8c017
SHA512a45e4a6084f755085c1f59b7c5a6591402fba11cfb57ef8c7fb06a9cc629cc450f2a087f7d696df5946edbe3739a256780587ad78af5b96aa2babbf7865da39d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd