Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 13:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.aweber.com/z/c/?vo_key=c6610ffe-3441-498f-a01a-813001cd71ce&split_id=coi6&locale=en-US&button_id=1
Resource
win10v2004-20240226-en
General
-
Target
https://www.aweber.com/z/c/?vo_key=c6610ffe-3441-498f-a01a-813001cd71ce&split_id=coi6&locale=en-US&button_id=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541185386595743" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1468 chrome.exe 1468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2392 1964 chrome.exe 95 PID 1964 wrote to memory of 2392 1964 chrome.exe 95 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 916 1964 chrome.exe 97 PID 1964 wrote to memory of 2416 1964 chrome.exe 98 PID 1964 wrote to memory of 2416 1964 chrome.exe 98 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99 PID 1964 wrote to memory of 1880 1964 chrome.exe 99
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.aweber.com/z/c/?vo_key=c6610ffe-3441-498f-a01a-813001cd71ce&split_id=coi6&locale=en-US&button_id=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb8659758,0x7ffbb8659768,0x7ffbb86597782⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:22⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:82⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:82⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:12⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:12⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:82⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4416 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:12⤵PID:5260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=6052 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:12⤵PID:5884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4964 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:12⤵PID:6072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4588 --field-trial-handle=1892,i,9901361416369925265,11491342704364798954,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4084 --field-trial-handle=3084,i,14217130992253490921,11543335378077656547,262144 --variations-seed-version /prefetch:81⤵PID:3596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504B
MD5b6b4a5993a6ffebd133213141bf04da0
SHA16d40fc4e1af1159493d228c65d1679f08bb22280
SHA25670df00fe46aa534f856a46745fb40ca15d5319e6b3fdd224970172b11e188948
SHA512196d69b4a414e309bfd2b57571186a5d95711a9cf4e1d994f17a8cb9370ed42325ef0f81bb0bee729ac3c6abb6babb9014d134960ba8148e94a17604d7d4016d
-
Filesize
3KB
MD57e68518de26a2a873f4faa24102a260c
SHA10bae53a0e440b0284cbf196d14c807cf248e7bff
SHA2563923989d4099f489f9cd0dc1a25efa21842c1ca3fbd4d35c0eb97782c7cb5ea9
SHA512d2b9cc03a10d849be874b82e395de7178a4d630ea477a627aaf54220bca09b09d973b2128f16b9dd564231b8598b316bad0e6f1c39936fab55dc90e0dd417d0b
-
Filesize
1KB
MD533f0baff5f18bb8210390aae13e58a63
SHA1bfe5246e5145920897e7b0b66a07aeca1d829211
SHA256d9ea1632be21efb82f20e8437b5d866fef825df6a9b21babc2f481ad93017ab5
SHA5120e1acdd634d4d01b01781af7e403f31659a6af6a014dfe9ed1c594842b65bb0f03aa58007ecde8814a46bcaa160f14be396131def72046ddd060ea2640bf0e94
-
Filesize
3KB
MD51b093a89fd39a8205d131a07d479e362
SHA1f91e2881a5f2ae5e1b79aaa01bb906ede4c0a477
SHA2564e23ce9cbd8a70fe03971d00d744b5fa1bc57208c0aa00d651dbc524256e7824
SHA512187de841a62d69f29c2211ef5c9f7f079c4b0b3934142639855d735986b24d18316aeeee3b8d90397fbfa5b608a30111865554723a18a490066c2c33f184a463
-
Filesize
866B
MD59a6707671c5aa1ff608f01e0006add39
SHA1770044137f3e06e4169d5008045168ff32f2a318
SHA2569c805bebfd7ad07188ed300e99626c4d84d3ba074a0ae146e36ccb39331f0881
SHA512569ab576b16bdf4ca4cd77305b14ce070eccf2a28367d72cd6492b11795e1baa7feb92be7bee8e56f327a5625ba5ced800a1226323891b9f08cd5857fcaa08db
-
Filesize
7KB
MD56a1d28e3c079139d602a2bb91e34e46a
SHA13b56e921a610a55f5a3ee8bcba24d270acca440a
SHA2567f64559d9dc699805ca43f6d506d3e2c4b62168ad7a3e7d3227535e40b215d37
SHA512adb93a97d9a6e0af31b0ca920922b5864cff938bc2e698dd47de9ce7737be77db7fedb934f49f01f667f28ef6a48f2f607c0efe02b659960d6bec984bac9a8b7
-
Filesize
6KB
MD5d5fc1feb6a953b5cfa7b37ad2d117d2c
SHA112fe542a9a1af2a40fadc3f502ce56ee89730a55
SHA2561257482af51012566d800d6c909bf79aafb45916d5f7b988445775b160dcdb97
SHA5122ecaa81193a2d4bbac745ef9bfb4aeca81c00b7bc73f197d82a13d015bf1962f163248278a39fd830ccef30252c249756902ae553d3963acc5894bd93862cb53
-
Filesize
253KB
MD5c3c90df78cad91df24a58beaae266a0f
SHA1de23d69657b5eaee12f8d06a43deb79afa0d79e9
SHA2567d3ad2c1ee4dabdb7e6cc66d08fb5dbf1d650f3666dd830b94c5cd0d152bdc37
SHA512a830c522a876ecb1c63d0d0b18db2ece2f9999f2eee1a45b3c7621c92611b2e5b541961e33ad25b1f88eabc69ef56264a1a33e0331cddd61643c5fe9a11c29b0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd