Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
308s -
max time network
309s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 04:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.communications.vialto.com/?qs=be89b62f9b9410f78ac03913e8f24bf458d8c1c052f334e2c99e1571dc6395dc29abf2986a9cafdc1a145e59a7a32ea99179283116a5e331
Resource
win10v2004-20240226-en
General
-
Target
https://click.communications.vialto.com/?qs=be89b62f9b9410f78ac03913e8f24bf458d8c1c052f334e2c99e1571dc6395dc29abf2986a9cafdc1a145e59a7a32ea99179283116a5e331
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541723148874245" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 5128 chrome.exe 5128 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 5060 4644 chrome.exe 95 PID 4644 wrote to memory of 5060 4644 chrome.exe 95 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3344 4644 chrome.exe 97 PID 4644 wrote to memory of 3416 4644 chrome.exe 98 PID 4644 wrote to memory of 3416 4644 chrome.exe 98 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99 PID 4644 wrote to memory of 2384 4644 chrome.exe 99
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://click.communications.vialto.com/?qs=be89b62f9b9410f78ac03913e8f24bf458d8c1c052f334e2c99e1571dc6395dc29abf2986a9cafdc1a145e59a7a32ea99179283116a5e3311⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff924139758,0x7ff924139768,0x7ff9241397782⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:22⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:82⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:12⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4560 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:12⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4948 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:12⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3220 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:12⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:82⤵PID:5700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:82⤵PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=988 --field-trial-handle=1832,i,15786511655110231677,6872814280900287949,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5128
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2972,i,4036376905309803364,5412922217215781933,262144 --variations-seed-version /prefetch:81⤵PID:5356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360B
MD54f13087f860322ceea34d7dfcbc07dee
SHA1af335111ff763278095f2805dcb74e4e2a16cfdd
SHA256806484e956c7b19b99bc8604f61b4ab60c9bb37045f4fcd58730b44ec1da1c9f
SHA512c97dc534e65cfda08e74c3b8d9b8b837f89e6e57995dd5300a1d1264199cd20d0862d216d33d14a23cc66a4fa9b1d3361298a25101364a852f7374474c3d3ee9
-
Filesize
3KB
MD551a1020da97d8ea63ae61610cbd06d07
SHA11967c7356ab5c682044e3b05e2abafdeab106805
SHA256699b8556321ceadfbc438563953c38fd26a88dad5bbaa0d1e65a6a10dfa22303
SHA5123fe4a506369da323c5933e578246229d5521f0423e48d1698a25610f6e7f6e51ea83e063b081bba8b7f1a08d34af536b5ce1007cfe738293acc07e37b4f7815e
-
Filesize
1KB
MD5d3892fdad07bc5c8e4d2ea8882c260ad
SHA1356a9e65b501bb7ea5a98ee3e234b396e53e33d5
SHA2567e988b4a51923539682697c5929f21f7d292fbba6872d15eda82d29c7a37c9f3
SHA51273580335a5280015e91d59f38ca86344b178c718d09556c1b582960f59031b173350368d581b00bef0ba7ca3bd818d2122f51c77d4cb9aad22262b26f15d4465
-
Filesize
6KB
MD5e01a518644eb50d758448e3720c40aca
SHA124de34a736e55c9ec635501c1416e8de7f8e8e6c
SHA256163327851fd310662ed57abd80f6cdcd15a3939aeb6e471a222996b08416f0f8
SHA512b96ff79c6e401bad72e50b7712dda853c9d1ca4ceec9c8c58aba77c124c76f848aa96879cf2e799be0bbfd71f30a67edcb5db71f5fce65d35bd2b442128ad239
-
Filesize
253KB
MD568ee9bbcda1c375b6f340d1d244d4670
SHA137f609a6f7cb6738f14ceefed7d9d2395224d5c9
SHA256f5950f0f25264179d8f1eac7490d6d96d8bcde7bfc83a0c7ebb18214218d4da2
SHA512cb678409765745d90f8d74aadaa263b205f7850c4de79d0542c7182c60f688e721aa88b57197e7bb570614d5b162879c6ddba600288f4da83222e3a8ebb0c4f1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd