Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 18:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.forms.exed.hbs.org/?qs=994cbf91ee2f00d738ffd6f8ba3d8cdd55c2f556c2e08fe01ed3a9353d2f89aca21190fe5bb6bd837a64aeef7a7ebdbc35b04806db2875ad
Resource
win10v2004-20231215-en
General
-
Target
https://click.forms.exed.hbs.org/?qs=994cbf91ee2f00d738ffd6f8ba3d8cdd55c2f556c2e08fe01ed3a9353d2f89aca21190fe5bb6bd837a64aeef7a7ebdbc35b04806db2875ad
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523230115671240" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 392 chrome.exe 392 chrome.exe 1640 chrome.exe 1640 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 392 chrome.exe 392 chrome.exe 392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe Token: SeShutdownPrivilege 392 chrome.exe Token: SeCreatePagefilePrivilege 392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe 392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 5028 392 chrome.exe 83 PID 392 wrote to memory of 5028 392 chrome.exe 83 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 4812 392 chrome.exe 85 PID 392 wrote to memory of 3108 392 chrome.exe 86 PID 392 wrote to memory of 3108 392 chrome.exe 86 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87 PID 392 wrote to memory of 4844 392 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://click.forms.exed.hbs.org/?qs=994cbf91ee2f00d738ffd6f8ba3d8cdd55c2f556c2e08fe01ed3a9353d2f89aca21190fe5bb6bd837a64aeef7a7ebdbc35b04806db2875ad1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5e689758,0x7ffa5e689768,0x7ffa5e6897782⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1824,i,10924186198118827410,10521926294400952683,131072 /prefetch:22⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1824,i,10924186198118827410,10521926294400952683,131072 /prefetch:82⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1824,i,10924186198118827410,10521926294400952683,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3200 --field-trial-handle=1824,i,10924186198118827410,10521926294400952683,131072 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3232 --field-trial-handle=1824,i,10924186198118827410,10521926294400952683,131072 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4616 --field-trial-handle=1824,i,10924186198118827410,10521926294400952683,131072 /prefetch:12⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1824,i,10924186198118827410,10521926294400952683,131072 /prefetch:82⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1824,i,10924186198118827410,10521926294400952683,131072 /prefetch:82⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2664 --field-trial-handle=1824,i,10924186198118827410,10521926294400952683,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD52415d124a281e7c44385ce6a7505b2f7
SHA1d7f941452ac53a657b62eb803fd2fb4e23b8782c
SHA2565e3f84a1a201ea58bd1e60521153c6bdf87eba6a8ecddb8685890780269ad5b8
SHA512e4e73f26f10e89d9f595acd7ab4099716664c718a519ab9db9dd67721c899c28ce182471c2cd32b7fcee10298ba29834055bda39451068d56cda2171237c5837
-
Filesize
899B
MD541ac39a312d1de7811c7bdee16a2900b
SHA1f4973692c56dcd6d36596c0a709dc3582ec231b1
SHA256d2cb2bec77b8322213092091c1e9ad548c52cdb9aea5d91439cb757795df5b10
SHA51272ebeac8fba2804590ec50a9011b84d00a70e09ae21a022818518cada7d322850ff433808cdc316405a37e3ffacff4f9f633c0d36420d0a44306219590ec5a5f
-
Filesize
538B
MD535cd260422abd0b8f19cd64a176f12de
SHA123a92086fab80618fb1099116cc7e51445056b6c
SHA2566b3867ad3c5544516a1ebe0861f96c70e4369cc261b590b90425ec68cf1da51e
SHA51228231dfe7a861d4be6faaf13611897e582f9a2cdbead690b2489d08dc5aba2fd8983b93316379e10197c6d28e952aee1e9007cc7a126ccf37410508781f76b34
-
Filesize
538B
MD56ad399df5bed8d9143fcddcd12b7f3bc
SHA1cf6724d94162ad6c17b82a642330a7e8e9be288c
SHA25634e2f490f2c39d5bac3f1046e29bd8a6d06778cd314416824ddbcc03b58c8f19
SHA5122ddd8d67a89ed4cecdaf516064018154d260b89ce45f4e9292fa46be382488c2ded33ed6f35fb8b6bbeec14ce3eef96c1dd1c8862131dd3eb0d191945b7b91a1
-
Filesize
6KB
MD5518238a04310678aed941339b7d946e3
SHA1a61f0874166de3a4792d6ab3716fe735c1bc46e4
SHA2564ca13c081a3b9c0859e44ed39083442b0dc9b2806a7b88e47e3fe8b5e24912bd
SHA512496c63150babf9051b37bf3f9b233035db782ec2f8ee27eaf876d16fbed2893593556d604b9aeba5f9e1823b9e173071a918ac3f004bad58036d67510ca9e6dc
-
Filesize
6KB
MD545c216e702b7de648b09a363e21c89f9
SHA17a475ab4d9dd22c9dbd2059113681bcb847047b4
SHA2566ff23ce21fcd885d380cfa6cc96a479c1e6b0566c6ff025a95a37f818d31a6b0
SHA512ab30d444f00420ece6156421fa38d39c3654aa62d43142b6cebcbb79300f06b9c14b025bf82d4b998c21822c877d610fc8980007e2b2debe572946b01157be86
-
Filesize
114KB
MD59987ee2188e0c2a94e53db4e5fbbda57
SHA11905bd0f5a544bb5af2cfb8c39077fd4d31cf9ab
SHA25634a7c2457ef2bbb825766732d746f89c3272b2c593eb3df2967614865e5e2b6a
SHA5127b7fe596bc14caf0b41187aa9f51e46a0085e1c7f1e5d3828fbee1af768da9d312a1ac2e09df7c59c4e93cc6f09133aab614a348eea671329431dfd9f7e582bc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd