Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 02:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b,8d23fb3,492093b&p1=halamall-sa.com/wp-admin/maint/mind/admex/ccs/sdnfkjdhgkadshcafasuhgd/bjdyskhdufasa/jsfdkgfhsdafghjdsfisgfusdfdagfidhfsdgcuxgcjhdscghdsj/963/ugz/c3JkZXNhaUBldm9sZW50aGVhbHRoLmNvbQ==
Resource
win10v2004-20240221-en
General
-
Target
https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b,8d23fb3,492093b&p1=halamall-sa.com/wp-admin/maint/mind/admex/ccs/sdnfkjdhgkadshcafasuhgd/bjdyskhdufasa/jsfdkgfhsdafghjdsfisgfusdfdagfidhfsdgcuxgcjhdscghdsj/963/ugz/c3JkZXNhaUBldm9sZW50aGVhbHRoLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531292742573155" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3604 chrome.exe 3604 chrome.exe 1276 chrome.exe 1276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe Token: SeShutdownPrivilege 3604 chrome.exe Token: SeCreatePagefilePrivilege 3604 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe 3604 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 4544 3604 chrome.exe 84 PID 3604 wrote to memory of 4544 3604 chrome.exe 84 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4908 3604 chrome.exe 89 PID 3604 wrote to memory of 4884 3604 chrome.exe 91 PID 3604 wrote to memory of 4884 3604 chrome.exe 91 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90 PID 3604 wrote to memory of 2164 3604 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b,8d23fb3,492093b&p1=halamall-sa.com/wp-admin/maint/mind/admex/ccs/sdnfkjdhgkadshcafasuhgd/bjdyskhdufasa/jsfdkgfhsdafghjdsfisgfusdfdagfidhfsdgcuxgcjhdscghdsj/963/ugz/c3JkZXNhaUBldm9sZW50aGVhbHRoLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffa9a7b9758,0x7ffa9a7b9768,0x7ffa9a7b97782⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1888,i,15023574446694197335,10403277247334860206,131072 /prefetch:22⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1888,i,15023574446694197335,10403277247334860206,131072 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1888,i,15023574446694197335,10403277247334860206,131072 /prefetch:82⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1888,i,15023574446694197335,10403277247334860206,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1888,i,15023574446694197335,10403277247334860206,131072 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4600 --field-trial-handle=1888,i,15023574446694197335,10403277247334860206,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1888,i,15023574446694197335,10403277247334860206,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1888,i,15023574446694197335,10403277247334860206,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2816 --field-trial-handle=1888,i,15023574446694197335,10403277247334860206,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c0f75da3342a700a2c40367b173e004e
SHA14359d0ce0716f45956d65d39577710a09f5415dc
SHA256b843b11a3409f5edad7172a4ac548bec06007ae0e24fa85d9ecd9124dcf4f19f
SHA5121e5833d36e0acb21117bdbe1d2559d6ec065699b42a9951f7f37957ad7286d4ff6039a3d920937ef6661e87f8a565090398d1e25937d156e9d16b6c506a82828
-
Filesize
1KB
MD5bbef216506da37786298ee5d3f502ea1
SHA157711e3166ed4dfd59e8d97f62bbc18ddc879638
SHA256b72ec7531c4653281bf03e7c556e2b954a34d9a40d1b1e796421d5ed656da030
SHA5125057e7bbadf6cb63fd0b47164d51510d077c02b009d1d4c55fc851237a6d7a34f46c24e315cf34ae754f51f7074cc975b9de5a7cff77dfd9c925a49398bb5d69
-
Filesize
538B
MD58116dfc59f2112c4f20cc037b90e8d26
SHA13f45660ff0ac4bdfd4f4d851851793df86eef4a8
SHA25639a65690e5a5b68870ff19a13d9971578ffdb0fce3f46ecd8e3f390450ecfa06
SHA51253e8d23c8528fd4b2b5861a98e6bb316550017130c419cd75c0683a640f46509b0fa5473c15c975dc79b24f59cede08d0f690903475b787c4e5d35630709cf05
-
Filesize
6KB
MD506dbc944647acce200fb9b31acde19e0
SHA191d541d8c48fbdbd8089f7a54881dfdf51ff0e75
SHA2560cdd320f0949b3de637acc9503e943348b5d09c200285fc8066b963bc760be6c
SHA51222cb4dc6c29fe2a5046c942f637a9aeddc615e1da994050dad84d1513530155f41afb016b0de094f5324709d65a367398d9bebff7c7e9e9612cb149d909a266d
-
Filesize
130KB
MD57b9c011b2c067378f7f40357d0ded9e8
SHA1c3915f306e44234dfb9ed6defbe7a4f54c6e03a1
SHA2564ba864a4b5b2fd7101cfd1f3d246888cdae86bd323a459159c1de0f231f77adb
SHA51258dc329bebc857760bf5cd92a39ef2d28e0c5fb22391a49c1cf1698d730aabd38fd3e1259ae406563ea33d1dcefe72145fad82312be97778077fa0cc8eb58303
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd