Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/02/2024, 04:53
240222-fh9yrsce23 1Analysis
-
max time kernel
299s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 04:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.yuswohady.com
Resource
win10v2004-20240221-en
General
-
Target
https://www.yuswohady.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe 3848 chrome.exe 3848 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe Token: SeShutdownPrivilege 3976 chrome.exe Token: SeCreatePagefilePrivilege 3976 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe 3976 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 440 3976 chrome.exe 18 PID 3976 wrote to memory of 440 3976 chrome.exe 18 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 4612 3976 chrome.exe 63 PID 3976 wrote to memory of 3376 3976 chrome.exe 60 PID 3976 wrote to memory of 3376 3976 chrome.exe 60 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59 PID 3976 wrote to memory of 1496 3976 chrome.exe 59
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.yuswohady.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd4599758,0x7ffcd4599768,0x7ffcd45997782⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1856,i,770908263150792299,17620572284841497620,131072 /prefetch:82⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1856,i,770908263150792299,17620572284841497620,131072 /prefetch:82⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1856,i,770908263150792299,17620572284841497620,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1856,i,770908263150792299,17620572284841497620,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1856,i,770908263150792299,17620572284841497620,131072 /prefetch:22⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1856,i,770908263150792299,17620572284841497620,131072 /prefetch:82⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1856,i,770908263150792299,17620572284841497620,131072 /prefetch:82⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3496 --field-trial-handle=1856,i,770908263150792299,17620572284841497620,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552B
MD546771b96f1522be4f7be0cb648a6b89a
SHA1f2bc14b4823496dfa63668375c746d884e8f3ca3
SHA2567a86f31f02a7195f197e56157d2a2809d14d48cdc4c2c85857615af439aecf30
SHA512920cf406ca0ce8b24c2fb74d286f84da891f95853e49b35ef8f670c458b76d9dd22b29f034dcfbe951304c20072774f527e074d5d1c373657dff9dd36017ee53
-
Filesize
1KB
MD5a892628049fae4bfb7060ffc4e2a69cc
SHA12c29088e7b1aafa9f19abc58cfcd8a00fb902088
SHA25649a8aabe6ec42e34fd61953676e83cdc77c428d4a8daf584f096c6d5d339342b
SHA51264b4845a588d1aa63d5a0bbc8b442a4d993022ce871c3be1d3a611490bb527f20204468dcedb6d7675e3730e0ef7ac783a787b814e43061c7ab1bc13258499fb
-
Filesize
2KB
MD55dc190dcba5fb63361fd34b5a114a38e
SHA14bc05fdcba656985d6baa10c622e764df77dc7ca
SHA2566224b9bb5ad08bc01965e665b26d3e69bc48cab7192f7f4a14095d9093ef33c3
SHA512c5ffd00ca5e6e437c2ce0d950611deeedbb8650f4a614dc2bbf7641e88cd56ac87bc36efead8e6cd6d9a8837182caf4052ad5a9524e5d0de0f23a09cc31ed619
-
Filesize
2KB
MD512cd3c858ddd77b93e164017ca0b3128
SHA144a672bbc3bbb1f58d9dcd5b8662232ae61a1e56
SHA256c61fadace46a0418d96d7eed6c92254bce24497b4e31fc6620d541c01acd5a3a
SHA512e77d0c36193abeaf2d07246f560839f2176c13f8ebce5a0ff5aa380fff2d3b5e96f8d5496ecc9147a7eac32ba1f2d538c8ea0daaa21ffbc043fcf3a9491961b5
-
Filesize
1KB
MD5384433d16a8e5a17ff60f35cbf469741
SHA18aa158841ba0052ae973c538f70cc550f777cc58
SHA256cbf91770aa0eee15465bdab5dc99967096ff830f31a0703d644ac4a78a8ed1fe
SHA512447e5ce8d99489726fe54dca154e0ad591c370493d03c6052e9b56191cab5ac50357df5965f7f7d73cf4a816f87afc279f72598f2f1fd923c22dcd102b37a751
-
Filesize
1KB
MD552fb4e5f3c751e4efe2bd09b751db0d5
SHA121f82f10864c93621e576adf8e671581bc84b7e4
SHA256bfdbb62effd2fa1c152c709f2499f9b2a18a93c80bf9741105c504d55c9d5c5d
SHA512a90594c923354af03ec98548e9c533e044290f7e3d4e5424663d86e948b02e8ce353d463ce9b87b9111459e8e4e5f07ccc89950e5a2c9bf9902cd33c5ad8544f
-
Filesize
1KB
MD5ba4163d4e09ffcc48440036fc3f05531
SHA15c9c348d4bac2036eaa101607c189526f93fea1c
SHA25689faa3a43834370438f7f96fc62a267e9ebc5ecb8ecbc596ab20862e607a98f5
SHA512a5c3eb6c40755c1ac0097c168e0536374e436ccd654fd2c5e82a44c64ad5ec99613d786837d556ae910889fe619dacb881687e0dbb5be6644c9632fa106ce2d3
-
Filesize
6KB
MD5e7705a20dc652c43c8e538c949c9bf9b
SHA13d8a25f0d2026280cfaef7c2bcadd2d003fcbd6e
SHA25676e12e88a045392c80f1c054e4018275a355a80e2b1a43b70a806854687b3b0e
SHA5120eba04548c47e624bb275bd773b946b0d765f07e34debf2fdad987f8c46de83e7f25bc8beeec7b726712dfc9eb921ba806286894fbd8d1c2b5a0d4d9f44a1d6e
-
Filesize
6KB
MD5f98d76c66130f7b9dde5404e99684a53
SHA1dcf4526f30c553cdecfa83ae8a06fc538adb4ec3
SHA256455dcb90b3d092ac63218cafbb8c246182f915b573ba9269ce1b266552307c06
SHA512104d9fe6cb1db89eedb2e6c9c32c57315bf5e6a1c363b81a7cb45d83c91cd3f233c8e78d52cff8ec0a2f4cfa5b03d60b07d505876673c84cb220a5d4d4aca089
-
Filesize
130KB
MD5534f7ed712137251ead29fadebf4fe97
SHA174f3a74a20653369b4cf9bbc5d90f98b80592160
SHA256fd7dfb8cd97be73ea980217fb8c0811d213fcd4da1bd5a37721cb2c796bc7be1
SHA512a1f580b7628db5ed2c09254b81fa4fbd36c8063ef96fcb919334326bf0a9433be70d771fa3bd1e745fd6b369055b642879605cd3e28207360cc39bdddb1f677c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd