Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1804s -
max time network
1697s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/02/2024, 17:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://theannoyingsite.com
Resource
win11-20231215-en
General
-
Target
https://theannoyingsite.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133512811482267953" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe 5072 chrome.exe 5072 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3488 wrote to memory of 248 3488 chrome.exe 29 PID 3488 wrote to memory of 248 3488 chrome.exe 29 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 1388 3488 chrome.exe 81 PID 3488 wrote to memory of 2132 3488 chrome.exe 83 PID 3488 wrote to memory of 2132 3488 chrome.exe 83 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82 PID 3488 wrote to memory of 3828 3488 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://theannoyingsite.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffeb4819758,0x7ffeb4819768,0x7ffeb48197782⤵PID:248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1572 --field-trial-handle=1780,i,6330452141690338760,17206578678814801314,131072 /prefetch:22⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2140 --field-trial-handle=1780,i,6330452141690338760,17206578678814801314,131072 /prefetch:82⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1780,i,6330452141690338760,17206578678814801314,131072 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1780,i,6330452141690338760,17206578678814801314,131072 /prefetch:12⤵PID:5684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1780,i,6330452141690338760,17206578678814801314,131072 /prefetch:12⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4484 --field-trial-handle=1780,i,6330452141690338760,17206578678814801314,131072 /prefetch:82⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1780,i,6330452141690338760,17206578678814801314,131072 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1780,i,6330452141690338760,17206578678814801314,131072 /prefetch:82⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1780,i,6330452141690338760,17206578678814801314,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3636
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004C81⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD54f162e663d7198cf093d80d1f3b65f7b
SHA18ef3735257150f393b615a0065fd008b807fb8a6
SHA256fb527a3e20065bc164414f0e5ee036fef4a9aa6eaf6887aaee9951005fba52b0
SHA5120481bfe7ba1dae496971d6e5b68d3a3738f9566be679d424541a2f2ffb26c64216788deb00839118a944cd31255a3e970be5cb24fbe0377065d07c6515222d6f
-
Filesize
1KB
MD536592575834010f1ee0bd20f3e2fdd04
SHA12002d995a4a55a0ac2a566732c14faf219afe279
SHA256c152766a5fda9ae5efe28543eba31484ec66d482f631004f226dcf3a6de648f3
SHA512b46a94a061cf0045f5fdc99c77433d3c0041efc709b7814eabe6fff052ae9517e25e471c0344ce85ad042f50b854cac0aca4cf26ddb76ada186bf73399e3e706
-
Filesize
705B
MD547298051dbb1add13f1ef54b9b86d7d1
SHA1997d04a2e9601c7112ad0174729c8d7ca650f1d6
SHA2560f8657d5be0563bca6f84c01d52d42fd9e65344b024f8ae526e3aec2924faa84
SHA5126831e8017f2421ef7cc0c19c3c108475fc724eb46f91af9288e563669e947f4901b07997636ae3d625760e06260452666307686b17f5d3c16e168a123d645721
-
Filesize
6KB
MD5aebd2579ef600b67c53d5e1c65c8da35
SHA1dacd23e41a051218565fc5ce797f6aea0facf7cd
SHA256673b1386f43dc209c4f04de7c314894c20d0110ac806630df899083d1f9b128f
SHA512b52f27d22feecaa754f6b225cfb4a56f445bf8ed67d3bd2623a07ddd075897e5a60bfcaae62bf4f0a1a6e53cd0b6bf39c300cbe3ceb98e0c3250d93046fadb0f
-
Filesize
6KB
MD522ad60ccae06b512479f0d0758b99360
SHA1bec5b06ff7f5de56baf4d48cec6d58d5fe1729be
SHA25611a56f6580c557cbe4aad44b3871aeed89d61bbc083e5cb2bb62e590dc0ce6d4
SHA51232920957b980fa681be2133958996511f347c2f251e88623784db2cb71be5a736fe04c11818dd3d6003d7be9f013af0a86685f78cce2e797ed90f733c1c31cae
-
Filesize
6KB
MD527619d0df8505be1b55aeec030fe21ee
SHA11fdfc65c90cc23b3bd6786e09a8986f7b5e2c882
SHA256f8b0ba5963a4910cde8e18930075016838dfbe303154a39e3463f5fa475942fc
SHA5123760d59cb60cb87e15c73c4ff3515c9caa867ff0195f56d047e913ca39ff3f5b5e3541e3a0eec62479d6a15605d09b400f9d0499eaa89dd96e09e598d0158955
-
Filesize
114KB
MD525f923c28cfb616c2a2dc527096e53ca
SHA1f8d6046e9da3321f231bfa88c1c1128b527348e7
SHA256b08866b43bdceacbcf6f4b4bd97086929266365374bea1b3e38748264818fa5f
SHA51295ee964fb837c0327772544a868f2a6667278df2b197cc497ecfa47382e9422b34a2374017a1d9b25ebb26d055645d452be4d7ca1992082c0a0e6cb79daf40ac
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd