Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 16:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://dinglee.administratorshop.xyz/?mail=redacted_email&url=http://redacted_host
Resource
win10v2004-20231215-en
General
-
Target
http://dinglee.administratorshop.xyz/?mail=redacted_email&url=http://redacted_host
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528329296885266" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 472 chrome.exe 472 chrome.exe 4492 chrome.exe 4492 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe Token: SeShutdownPrivilege 472 chrome.exe Token: SeCreatePagefilePrivilege 472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe 472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 472 wrote to memory of 3608 472 chrome.exe 85 PID 472 wrote to memory of 3608 472 chrome.exe 85 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 4732 472 chrome.exe 87 PID 472 wrote to memory of 1492 472 chrome.exe 88 PID 472 wrote to memory of 1492 472 chrome.exe 88 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89 PID 472 wrote to memory of 4428 472 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://dinglee.administratorshop.xyz/?mail=redacted_email&url=http://redacted_host1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeac309758,0x7ffeac309768,0x7ffeac3097782⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:22⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:82⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2772 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:12⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2764 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:12⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4044 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3980 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:82⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:82⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4152 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:12⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1792 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:12⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:12⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1728,i,9432930603192565857,850077701731739868,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5f330735cf2aab798ce41f9f528cd7e52
SHA1690baff018060621ccc06a8ab1d1ed3c03a3ff71
SHA2563c32f8474fa90cb448b6ec9fd1a42170f4f9fc9a41e03eb7bc43ce58062fe63a
SHA512640f7365b7883cbbc3e1736835958a40de2b0cdd6b65018134032d3d1e5ef45cc69e9032a13af577679046aac4f02de4e5c08d005a68193c66fce1ba34cb320d
-
Filesize
6KB
MD5b395bd84a5dd3968ba2dbdf497e2b1e7
SHA1810a4f7c0f1cd62e03b2d0c3a357e354269fb969
SHA25635f959b84dc916f69b5619bd06561e1f47d79ac4b6480fc43a04a35c041cbde6
SHA5126c9be7d00bf989ca583c6a1dd9f9e3bb9899d2a252ab33597b2db0d427fc5617eb43bcf1a54e2bb1594a65daa5701bffee41e47b616a275dad28fc788a63d475
-
Filesize
6KB
MD5c102af120717d7341a8196a2abd4506f
SHA14ebd68004d085801e14f9ab19dc3a0006ac0f9a5
SHA256a0f2964330d4c97e97c6eec38b4cdde22331462ea88940f5adc53a4ff3857046
SHA5121bc1f67ffde619c4f9275af715bbdf9506f57261c1e72e989932712064d551fffcb5a03169423b72817cd4d7326e33e4e960d7effd91780b0fb32d33160677e1
-
Filesize
114KB
MD5cd32ab30b8d0bca7c934e21576a7b1ac
SHA1bb278113e9bf355e47cfa5c05b9d4de8574aa5af
SHA2565f87de76df8ed42a6e0756f239b19a286d5046792386ed8b3c656e8bd74a8596
SHA512e775607834d2a730f9d5bd1f1272c14b23a8981cd95517cd81b17bf10ba98c7b5e6e047abb142611c66ec110cd6866cd6d019f0a6933b571f6bd447def63dc7d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd