Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 13:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://email.mg.myscoot.in/c/eJwUyjuOgCAQANDTQElmBhApKLbxGht-KomIQdzE22_sXvGSi17SLHl2aMBYmA0g350hhaBBrnqFACprChNMOEWyQAo8L44-ECr8IgoMOs0BpLEYwAbJFNRN1PeOrQ1RTn64fYzrZvKH0cJoqW_POeWenthEbJV3V9J71rZZ1ExBufxe_rJofePDxecerf5WX47_AAAA___P8TUL
Resource
win10v2004-20231222-en
Behavioral task
behavioral2
Sample
http://email.mg.myscoot.in/c/eJwUyjuOgCAQANDTQElmBhApKLbxGht-KomIQdzE22_sXvGSi17SLHl2aMBYmA0g350hhaBBrnqFACprChNMOEWyQAo8L44-ECr8IgoMOs0BpLEYwAbJFNRN1PeOrQ1RTn64fYzrZvKH0cJoqW_POeWenthEbJV3V9J71rZZ1ExBufxe_rJofePDxecerf5WX47_AAAA___P8TUL
Resource
win11-20231215-en
General
-
Target
http://email.mg.myscoot.in/c/eJwUyjuOgCAQANDTQElmBhApKLbxGht-KomIQdzE22_sXvGSi17SLHl2aMBYmA0g350hhaBBrnqFACprChNMOEWyQAo8L44-ECr8IgoMOs0BpLEYwAbJFNRN1PeOrQ1RTn64fYzrZvKH0cJoqW_POeWenthEbJV3V9J71rZZ1ExBufxe_rJofePDxecerf5WX47_AAAA___P8TUL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523927875245381" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 744 chrome.exe 744 chrome.exe 888 chrome.exe 888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe Token: SeShutdownPrivilege 744 chrome.exe Token: SeCreatePagefilePrivilege 744 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe 744 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 4208 744 chrome.exe 61 PID 744 wrote to memory of 4208 744 chrome.exe 61 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 2496 744 chrome.exe 87 PID 744 wrote to memory of 4448 744 chrome.exe 88 PID 744 wrote to memory of 4448 744 chrome.exe 88 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89 PID 744 wrote to memory of 2168 744 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://email.mg.myscoot.in/c/eJwUyjuOgCAQANDTQElmBhApKLbxGht-KomIQdzE22_sXvGSi17SLHl2aMBYmA0g350hhaBBrnqFACprChNMOEWyQAo8L44-ECr8IgoMOs0BpLEYwAbJFNRN1PeOrQ1RTn64fYzrZvKH0cJoqW_POeWenthEbJV3V9J71rZZ1ExBufxe_rJofePDxecerf5WX47_AAAA___P8TUL1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd09269758,0x7ffd09269768,0x7ffd092697782⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1580 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:22⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:82⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:82⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:12⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:12⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4536 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2832 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:12⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2196 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:12⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:82⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:82⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5588 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:12⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3696 --field-trial-handle=1856,i,5702673661796478946,7825289980924098437,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD54d5564af883f7df12beac0cab9236400
SHA1ed44622f4d548fd3e2ba79173c6c825e03ddc8e8
SHA256ca4a66b1c47faf6068e490def8cf4e802b5675cf4af1dc691acc4b47b81b142d
SHA5122cc0198383204b2aac42b54d8694e658f6959d89d7536b707e963250bd22a13345933830e5aa5a9afb46e02c154d42bd61cf9472ebc74e8eb60c7d3278f2f239
-
Filesize
1KB
MD5ae38bb0aa5e7c4d6e5fcac82cd2b638d
SHA146db6fd8ff047324a6246ad01f011c6dbea2740f
SHA25690fd8eb94ffb6e5c9385ba3b8e1028341f7ae9f57c2ea991b32684355103a2e2
SHA51292b088492bc11b32c2c626c94000ce9388574e99c5b8cc89a9e01e68f56fad50e98b0e0b7c008074fde602d5907848051b437ae64a25f00cae1985256740915c
-
Filesize
6KB
MD5f7f828440e7530cd2ab6e9d1c8bdb89a
SHA14cd5abbb6e4a669e3eca46d9422fb7e8cc9a7d14
SHA256852e98726358ba9f09c2ea67a298826d6865b205fac68af9ab8c9a963f843cd5
SHA512d4a6091cae6460413bd8edf4ed01713885eb6c3c8d76486ccbb0b399c8ba29b195f1b42050b2e3698f53151d5df8bd77f6ef8ef0835dde02091c4b0eeddf3582
-
Filesize
114KB
MD5c54741aadc17563cb41331d681871f38
SHA1ae6d67a46bd1671a418848006740a56c1397d482
SHA256e89a9d886a9e52143d17a8d7f9e3dcfcd82b4b747d87545e42bbcf933878f0da
SHA512d67c9fc79c14468dbaa21ef21b622d3cb9f42a23ae9edeb62d96aee4798a4b9f7ea3a74e282be4e75abfb727bda0425d0b03b484b097e3bb2e620585cb83d7d4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd