Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 10:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://link.lawconnect.com/?link=https://o-w-kitchenk%E3%80%82com#w7pvlwyoZy5tb3NjYXJpZWxsb0BsaXN0LWdyb3VwLmNvbQ==&&ya8eu0&lvi8fksj/71FKjyqDb4/GEbON5wtJcPV6Y/Zy5tb3NjYXJpZWxsb0BsaXN0LWdyb3VwLmNvbQ==
Resource
win10v2004-20240226-en
General
-
Target
https://link.lawconnect.com/?link=https://o-w-kitchenk%E3%80%82com#w7pvlwyoZy5tb3NjYXJpZWxsb0BsaXN0LWdyb3VwLmNvbQ==&&ya8eu0&lvi8fksj/71FKjyqDb4/GEbON5wtJcPV6Y/Zy5tb3NjYXJpZWxsb0BsaXN0LWdyb3VwLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543657410841094" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1152 2076 chrome.exe 94 PID 2076 wrote to memory of 1152 2076 chrome.exe 94 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 3100 2076 chrome.exe 97 PID 2076 wrote to memory of 2616 2076 chrome.exe 98 PID 2076 wrote to memory of 2616 2076 chrome.exe 98 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99 PID 2076 wrote to memory of 4824 2076 chrome.exe 99
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://link.lawconnect.com/?link=https://o-w-kitchenk%E3%80%82com#w7pvlwyoZy5tb3NjYXJpZWxsb0BsaXN0LWdyb3VwLmNvbQ==&&ya8eu0&lvi8fksj/71FKjyqDb4/GEbON5wtJcPV6Y/Zy5tb3NjYXJpZWxsb0BsaXN0LWdyb3VwLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa06069758,0x7ffa06069768,0x7ffa060697782⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:22⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3236 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:12⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3244 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5492 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:12⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5220 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:82⤵PID:5168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5280 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:12⤵PID:5352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3256 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:12⤵PID:5644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5808 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:12⤵PID:6008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5996 --field-trial-handle=1876,i,17597158581628177316,5494447920555135830,131072 /prefetch:12⤵PID:6108
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c936b0a703cada3ba3aa6a9ed4a8147c
SHA17a896217b5a5eda39ac573b01dae4a135110b130
SHA2569038ec0ad9d3fff246bb3e503587395cb031de11faba67ac05f32d84bfc4a0be
SHA5120efb31b76d9be5ff363a0c2f06b15fd2de2f88e03840cb66fff8103e626317847290c662eac631a0c5e2ee38093b31a91794330a3f3fccc1399bfc02c28a1113
-
Filesize
6KB
MD53ce046b45b4f9854e7738118c90ce6ba
SHA1d5c4c0a99ef1d673c1713985b9c78340f6b99067
SHA25615f703ca2796f9b806ecb25e27caed39669c7180dd61c2ef99fc10461a276330
SHA512888feb9936fcc1c1c75adee0981a5ec3f72a831aa8608bbee667c9580d1dee759439541137ea2bbd41aeb452fd6fcf68ac12607f29bb63e0c6a0cc58c305cb33
-
Filesize
7KB
MD5a6dc1a1ea03f7ac371f025a4c536a00e
SHA18d4246f28c011364fd127e9c3489c8a0644c1e1c
SHA256fa6f03f5da5721facf99f75daa013a2baf0a3aedbb0691adc1f994e4281fafbb
SHA51201d393cb74f9a703c864b75bd79dc052f9a130e1becb8457601ab4163bee65b9d77b3260c32a5933394ebd5a50c6bf71a973d21e902175eb9c05be3e74572036
-
Filesize
128KB
MD54b05c491581acce4ea489fe7681c02b9
SHA1d7316a53d4fe99acb457837d235446e53c2354f5
SHA256d05e7521183ddab5fc0c032931213d70a5c8328789911187f7607c32e4075a9a
SHA512ae8051252937167c0da47f610ecbd7ac021007c10e615da88b72dcb5b9849a6ef5126013f87ce63fedc3df596ec37c26024eaec04948f1f7764ba6b6e06a6820
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd