Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
42s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
20/02/2024, 14:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://uksafety-management.exvmm.com/page.cfm?article=0x36f1e460cf2f89b379da83b61360dbda.0.190347
Resource
win10-20240214-en
General
-
Target
https://uksafety-management.exvmm.com/page.cfm?article=0x36f1e460cf2f89b379da83b61360dbda.0.190347
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133529147554960265" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 5060 3156 chrome.exe 73 PID 3156 wrote to memory of 5060 3156 chrome.exe 73 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 624 3156 chrome.exe 79 PID 3156 wrote to memory of 4260 3156 chrome.exe 78 PID 3156 wrote to memory of 4260 3156 chrome.exe 78 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75 PID 3156 wrote to memory of 3176 3156 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://uksafety-management.exvmm.com/page.cfm?article=0x36f1e460cf2f89b379da83b61360dbda.0.1903471⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffeb5819758,0x7ffeb5819768,0x7ffeb58197782⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:82⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:82⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:22⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:82⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3576 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4624 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:12⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5748 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:12⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 --field-trial-handle=1868,i,12040515366053249786,17587031862702441088,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1018B
MD511002f43af02e818f42ee3a15aee990e
SHA13d2517a88d486fa33c13a2c1d62a69c048171517
SHA25676210729a8fc790300d12590b06a955018dcfd7d53b9a517bf6314e437e49d4c
SHA5123cb1286cd8432499906c7e40469eb9b0564a72aef0c901664528210592eacfc9ec7f1ee9d16224ebb45c890dc3d0707f9e6dd6932a2196526425ed8afe61653b
-
Filesize
1KB
MD5ae26676bcd5adc1b6dfded183b4dd10e
SHA1d4acf0087aec6b6a18537e95fcd08570e71b340e
SHA256262c2dec8134f003704ab15ad43e70f8922da0244e00d90f1ae1f27571be0172
SHA512d2ae474f703ddd9ff33fda6c933f0d2c53ae2b130d23bdfe5554dde970170f97873243d7cbf8b1938b31e6ba3363ccbac799cb460b5ba680c5f752b1627635de
-
Filesize
1KB
MD5482a949548cdce0d6194f606c6468327
SHA178f522a2944687cf87207f9a020594f061794c11
SHA256072f91cb0c67d62e0cdf6fde1f0d42ad9ca6de7362c82efac00c6bf8a1c080fd
SHA512e66c1e36441ae04f9f641ab6274a1323faa44f9e0d99127cc966557bfb3dd3e9fa0f8e0b764ac16af396d7fe746b1ebc96393a9b5c55ab1ad7ca88932edfc2a1
-
Filesize
6KB
MD5559f537ace185ed0dd37f8723de2b27d
SHA1d972276982245d45861464506b9fd479e859119b
SHA256e486fd04428eb04a105b5e124e252d995ff90f0507808e0c17df81d00c965050
SHA5127cd3784eba5d362cf93f7d15034f1d20ecda3281c9072e261d88ccd71fa2714a9a1a464e8e02c4d5a204dce92ec3f4b6233d9b9c4e9a39a5f69df41e88ff8ee8
-
Filesize
6KB
MD5e429e04229cedd40f001f633a37b25e9
SHA1af74164d56fa10f96de67ca4e7a52395e8a04f8f
SHA2564e88ed1bb5bf6f66b7fc730c0666cb70141726ca10dc20650910f8bb3a71c415
SHA51275fc11f2ff088c88cd4854fd621c77df4cf52fa1fb5b73eaec405795d56cb6e08f8506df4c52834d2eb54d20d594a2b69ca3493eef6983acaef4a06000605374
-
Filesize
131KB
MD544b8b07b7761ec6f57dce8b379ef8056
SHA1ae47932d05b06d6c8e0a5f1f8b473c3e9e3ab20b
SHA2565d739f99ec59b1189f187d4045cc11dd2626d7dc266f27650cc54cb443ad4aae
SHA512a71ed106c2defeafe5b04fc3c26a096a1ec73cd239ab80bdc994901033eb71fa5ce7de59dc807cf6f8a510a38573fd52e580a14c41f2d68c5c461b714b33dd9f
-
Filesize
131KB
MD581911a36d6ba3b2a2a7282937b701357
SHA1bbef83b13e55f915ab33fd0ece7aea3393bba604
SHA2561409ab027bec7cf4fe1137771e4e629379465f716e940e81d42d3bdae9b11c60
SHA5129e468caa351558158b996e511ac2ef41de190826cccbcd8182655fee592ad305c8d5f610c677c537f6cdb656befacbd20e8fb278824632c1b7a591840943e86a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd