Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
34s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/01/2024, 15:42
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//mcintoshhomesandconstruction.com.au/d687398hak1/sg26al/?userid=Y29sbS5jYXNleUBpb25ncm91cC5jb20=
Resource
win11-20231215-en
General
-
Target
https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//mcintoshhomesandconstruction.com.au/d687398hak1/sg26al/?userid=Y29sbS5jYXNleUBpb25ncm91cC5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133510165946664454" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2280 chrome.exe 2280 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 5080 2280 chrome.exe 79 PID 2280 wrote to memory of 5080 2280 chrome.exe 79 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 4988 2280 chrome.exe 82 PID 2280 wrote to memory of 2160 2280 chrome.exe 83 PID 2280 wrote to memory of 2160 2280 chrome.exe 83 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84 PID 2280 wrote to memory of 3928 2280 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//mcintoshhomesandconstruction.com.au/d687398hak1/sg26al/?userid=Y29sbS5jYXNleUBpb25ncm91cC5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffccd779758,0x7ffccd779768,0x7ffccd7797782⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1816,i,7722872522500168504,12680193645607282955,131072 /prefetch:22⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1816,i,7722872522500168504,12680193645607282955,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1816,i,7722872522500168504,12680193645607282955,131072 /prefetch:82⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1816,i,7722872522500168504,12680193645607282955,131072 /prefetch:12⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2116 --field-trial-handle=1816,i,7722872522500168504,12680193645607282955,131072 /prefetch:12⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1816,i,7722872522500168504,12680193645607282955,131072 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4528 --field-trial-handle=1816,i,7722872522500168504,12680193645607282955,131072 /prefetch:12⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1816,i,7722872522500168504,12680193645607282955,131072 /prefetch:82⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1816,i,7722872522500168504,12680193645607282955,131072 /prefetch:82⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
707B
MD5a0d8b0187f0f93f2d7d5bb4e9b977ca1
SHA1204501eebdb6b28d6e60f562751f6a490371066f
SHA256d0868c9731cf0d0a7fb676a31917b278ad75fdd160362b9360dd4e03fe8169df
SHA512c240db5826079adac6de3a96a99e1fd7f6d1203f80625f66b2665ffb93341ab9a4035123c1e0e7e5706484f529f585b3ac82f82590eff354fce4c4142bc63f7d
-
Filesize
707B
MD5bc7875fd2c88f77e1ef3e0b8e8ee34f4
SHA18fc62d862894d81f051cd467a61ddd177d23ecee
SHA256b899f907845fb7a15e194a0dc1689fcf64155c7838e9097c5748e8aad22ffff2
SHA512a244b4d3ad9f75e36829b012f8c19c60eb9a23e7e7f75446cb78ac674cdcb6a22fb3d196ae2d01a5a0ec67ee5ff8da573aa79ed6e41cdb9bbfa8d14c35d641cb
-
Filesize
6KB
MD5b421944258e323fca03404a070b760c7
SHA1ec8be1fef91e0bfd866a52bb81bf52b4840c65a1
SHA256efad2d82266445942afc6224ff71eddb8a51402fc17949e2da0514ca0f3714cd
SHA51247f7a50a6883a2f2a30f758a7ff60035d6c83423c1aea71f5997353251232e91d03aae52b3e9287c5f3c5883b7382eaff1edf2406b44a60e8482ab7b193c27e6
-
Filesize
114KB
MD52a4681abda98cc1ffaf4974400b12a99
SHA106cb7d81e106889003aa1dbc56c7495552516175
SHA2567cb3511116db2e2f097fc5d705b726b19d446c5d53ce7ccd5d7a69f1b5e9055f
SHA5120f9974308719997746cee7ee5879d1ab221d0de5cffbdd54fc70a31a837df0ceeca2bc8802de88468aa8e3288a406607ebb58e38fbb8de67cb087d6ab3386d45
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd