Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
64s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
14/02/2024, 12:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=http%3a%2f%2furl6168.byondcard.co.uk%2fls%2fclick%3fupn%3dBTkkK%2d2BDFWmAsfLZqAYR7qO2OL2hAset3nX54xqwpJdayNPgRIgWjUfQVDvLDhmrK3he%5f%5fUhPZkopTI9XxQT7tooyXT5LK5iLmx62GzgKu21JD1ts6NpTWr14aIX9RzoSIg4xMT899MuJf%2d2FGpmW%2d2B8sGl4IQO%2d2FYL2AvG%2d2FMwKvCmu4nC28BqqcupLD6QJx8KhptH6cNYDhZo1h6pP1Ivzdudgjb%2d2FR87L9uJpLwX9jvxr6wv5JUHqIPubXodaWMRrdOqNsXU8RgwysIhY72A6mSqGil9hy%2d2BHRtt09A%2d2FLZI%2d2BRTn%2d2F2hX4hZAs95nuBRfLN2Gl6eTeWC&umid=c02614be-3dca-4db3-9dbe-030c732b8343&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-1e410d52cea4f5d44bf34aec3ce36645253375b9
Resource
win10-20231220-en
General
-
Target
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=http%3a%2f%2furl6168.byondcard.co.uk%2fls%2fclick%3fupn%3dBTkkK%2d2BDFWmAsfLZqAYR7qO2OL2hAset3nX54xqwpJdayNPgRIgWjUfQVDvLDhmrK3he%5f%5fUhPZkopTI9XxQT7tooyXT5LK5iLmx62GzgKu21JD1ts6NpTWr14aIX9RzoSIg4xMT899MuJf%2d2FGpmW%2d2B8sGl4IQO%2d2FYL2AvG%2d2FMwKvCmu4nC28BqqcupLD6QJx8KhptH6cNYDhZo1h6pP1Ivzdudgjb%2d2FR87L9uJpLwX9jvxr6wv5JUHqIPubXodaWMRrdOqNsXU8RgwysIhY72A6mSqGil9hy%2d2BHRtt09A%2d2FLZI%2d2BRTn%2d2F2hX4hZAs95nuBRfLN2Gl6eTeWC&umid=c02614be-3dca-4db3-9dbe-030c732b8343&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-1e410d52cea4f5d44bf34aec3ce36645253375b9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523863966742199" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeCreatePagefilePrivilege 2196 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2412 2196 chrome.exe 44 PID 2196 wrote to memory of 2412 2196 chrome.exe 44 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 5036 2196 chrome.exe 77 PID 2196 wrote to memory of 3296 2196 chrome.exe 76 PID 2196 wrote to memory of 3296 2196 chrome.exe 76 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78 PID 2196 wrote to memory of 4216 2196 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=http%3a%2f%2furl6168.byondcard.co.uk%2fls%2fclick%3fupn%3dBTkkK%2d2BDFWmAsfLZqAYR7qO2OL2hAset3nX54xqwpJdayNPgRIgWjUfQVDvLDhmrK3he%5f%5fUhPZkopTI9XxQT7tooyXT5LK5iLmx62GzgKu21JD1ts6NpTWr14aIX9RzoSIg4xMT899MuJf%2d2FGpmW%2d2B8sGl4IQO%2d2FYL2AvG%2d2FMwKvCmu4nC28BqqcupLD6QJx8KhptH6cNYDhZo1h6pP1Ivzdudgjb%2d2FR87L9uJpLwX9jvxr6wv5JUHqIPubXodaWMRrdOqNsXU8RgwysIhY72A6mSqGil9hy%2d2BHRtt09A%2d2FLZI%2d2BRTn%2d2F2hX4hZAs95nuBRfLN2Gl6eTeWC&umid=c02614be-3dca-4db3-9dbe-030c732b8343&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-1e410d52cea4f5d44bf34aec3ce36645253375b91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8949d9758,0x7ff8949d9768,0x7ff8949d97782⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1820,i,21617848783198204,13992415223397991213,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1820,i,21617848783198204,13992415223397991213,131072 /prefetch:22⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1820,i,21617848783198204,13992415223397991213,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1820,i,21617848783198204,13992415223397991213,131072 /prefetch:12⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1820,i,21617848783198204,13992415223397991213,131072 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4600 --field-trial-handle=1820,i,21617848783198204,13992415223397991213,131072 /prefetch:12⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1820,i,21617848783198204,13992415223397991213,131072 /prefetch:82⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3792 --field-trial-handle=1820,i,21617848783198204,13992415223397991213,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD54917af541638ce7a278bb420c962f1e1
SHA19f67057d1172e75eedb346e9aba0cf6515e38311
SHA256a63dad195fd6514ac0b4abd9430aa7d1594a36b694ad5ca1fb73546c85e0eedc
SHA512a7383e6c938292489d8a9f442d9e138636a0562d3e59ddf729620828badb73f0f93a63aeacbad184246ce2511ac72abd77642f809514296f5aad783fa186b164
-
Filesize
1KB
MD54107fc0bb9274739502afabe2cfc7e12
SHA184ad462dd95de5d559c27dea2d8b6bd818a12921
SHA256e7d8eb33e54101a842a1b9138f997f8e778cf810c92e1e83c2a256cbecb06c88
SHA512a124e8cdf9f9a619cbb77fdd61562b92dcd52f16cc4fb721cba6c6e16619e6d4279128bfc849a064413bdf74053a2820b96e977580461816394a3367d9b8a847
-
Filesize
6KB
MD5638a8fd90ac674de1c03f45c0b19c723
SHA122880b89068d5903b30fc6ee386b8af5c881c345
SHA256fd897b1e899339bebc84ef9977dad71b7b611defa4eecf2ebfb06e3d6f7c3bb8
SHA512aa31536ea25c71bb26f36ed7c9a1c2c53ac1824e49f44b04ffeecb0077562b111b1e16c0482f16c09138bc6d3074aa05fbc1c3d61c6e191ac57713236290f654
-
Filesize
114KB
MD5999442d6893faf3f0f06a79a0b2fd595
SHA1fdc35349319306e5f905d39cd0576892ac1bf2c6
SHA256d55947f4c14e3b8287dbb46c343b9806fccf35960ea9ad1eb4e5bca25214672a
SHA512d98dd7f7f8246039eb2db09cc76452c2681c42c89dcd63ff03adbc25d35211408a67648833f957baad14a905bea32503fd335973c5fb7adad16a02820cec53f5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd