Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 23:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shortly.at/Yy0me
Resource
win10v2004-20240221-en
Behavioral task
behavioral2
Sample
https://shortly.at/Yy0me
Resource
macos-20240214-en
General
-
Target
https://shortly.at/Yy0me
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531176583788030" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1788 chrome.exe 1788 chrome.exe 3696 chrome.exe 3696 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 652 1788 chrome.exe 17 PID 1788 wrote to memory of 652 1788 chrome.exe 17 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4968 1788 chrome.exe 90 PID 1788 wrote to memory of 4268 1788 chrome.exe 89 PID 1788 wrote to memory of 4268 1788 chrome.exe 89 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88 PID 1788 wrote to memory of 4672 1788 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf5a19758,0x7ffdf5a19768,0x7ffdf5a197781⤵PID:652
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://shortly.at/Yy0me1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1888,i,17475915429216342015,7261063189789813683,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1888,i,17475915429216342015,7261063189789813683,131072 /prefetch:82⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1888,i,17475915429216342015,7261063189789813683,131072 /prefetch:22⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2772 --field-trial-handle=1888,i,17475915429216342015,7261063189789813683,131072 /prefetch:12⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2784 --field-trial-handle=1888,i,17475915429216342015,7261063189789813683,131072 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3912 --field-trial-handle=1888,i,17475915429216342015,7261063189789813683,131072 /prefetch:12⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1888,i,17475915429216342015,7261063189789813683,131072 /prefetch:82⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 --field-trial-handle=1888,i,17475915429216342015,7261063189789813683,131072 /prefetch:82⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3336 --field-trial-handle=1888,i,17475915429216342015,7261063189789813683,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD550e3cb018ffa6a8a9d0dacbbaa339c00
SHA103d475e0078412488a05ce7a1772d3f7ab671fe5
SHA256edf3777a7a69b7f7ee93188f392985eb4e5cd20aeaea25f8be5a67426134d426
SHA512e55bafd3e068faa59c30809342add9dcba1b2f829c20510fafb1e1bc89570e09542720bec6b98602f6da04858ff3864b932623325b7b4d31f7ce496869f662cb
-
Filesize
96B
MD5aa7a0a19078bc8916ce10dab7b7735cb
SHA14fc814b9b199e765888845a424d9e9079feb1b38
SHA2566975ff0bc6c644ffb2bc909aca793a4ccf9769bba8f7f3d4dd29f869fa08c769
SHA512951f3870f4a58d8db8ab4885870928ad89992b39322eb6de7dfabec8ce9b836746c6454281667d807b9a3f2134e0db36f31ed508cac920b84f2d6a1dcfa6af67
-
Filesize
2KB
MD58acab679c52c88f88752988186fdb34c
SHA12ed373a1432887bd7f8c70eb230d008b4a707911
SHA256e8381eacefe5322f1d4fe486258a2e78dd98c2e34262095f04822871c71d7047
SHA51279c5b686eced650e1d9b0f3434bbe733060f20e0aa2dbabffc7672252ab3a9643570fb80cd38ff1709847a9d7f88ae3fcb45da5d4cd16ae61813d9d328a7180f
-
Filesize
1KB
MD510873ac4124cc0040409d27188fd5679
SHA1016b09d4cad9851faf227306d0ae601494838983
SHA2563cc54aa9f12db4f23f60f31554d12c1804de48401a7bc3c86423c8ab7d38ba8d
SHA5124a3d25916382d962f8aee20a5dde5a69b61cf631e320b5faa4c6ec82d521f1a13962885a1327c61a7e8a21936272526be55c86c317a8b4d3c77bf030ee61819a
-
Filesize
6KB
MD568cb96ef4e4c2b3d821320c2dc455718
SHA19e0adf75a075bd2833e2979cc6120c55bbddf2ce
SHA25666a45c4063bf0714501270a2079094a254fb6859c281d9e5d9667f610e9b7115
SHA5125b6b8dc84d2eeff7f551bef4f41c488110bd313dd29110458fefe8deef45ab40c9896e91c392645dd7461651b0278307e2c9210ceacf59c1d4f5583e696f2fa0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd