Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 00:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wpu.soundestlink.com/link/65efced82f441822f84f8737/65efcebf378827cf1becc232/0?signature=f66ce76f9c7ed120468f76c8e673f49e5b02b4bc3449854e255cfaba82c5af1e
Resource
win10v2004-20240226-en
General
-
Target
https://wpu.soundestlink.com/link/65efced82f441822f84f8737/65efcebf378827cf1becc232/0?signature=f66ce76f9c7ed120468f76c8e673f49e5b02b4bc3449854e255cfaba82c5af1e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547648612942514" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1900 chrome.exe 1900 chrome.exe 1864 chrome.exe 1864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2956 1900 chrome.exe 89 PID 1900 wrote to memory of 2956 1900 chrome.exe 89 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2032 1900 chrome.exe 92 PID 1900 wrote to memory of 2400 1900 chrome.exe 93 PID 1900 wrote to memory of 2400 1900 chrome.exe 93 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94 PID 1900 wrote to memory of 3780 1900 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wpu.soundestlink.com/link/65efced82f441822f84f8737/65efcebf378827cf1becc232/0?signature=f66ce76f9c7ed120468f76c8e673f49e5b02b4bc3449854e255cfaba82c5af1e1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff36109758,0x7fff36109768,0x7fff361097782⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1884,i,1563614005361254263,18316954134056111958,131072 /prefetch:22⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,1563614005361254263,18316954134056111958,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1884,i,1563614005361254263,18316954134056111958,131072 /prefetch:82⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1884,i,1563614005361254263,18316954134056111958,131072 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1884,i,1563614005361254263,18316954134056111958,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4980 --field-trial-handle=1884,i,1563614005361254263,18316954134056111958,131072 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1884,i,1563614005361254263,18316954134056111958,131072 /prefetch:82⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1884,i,1563614005361254263,18316954134056111958,131072 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3908 --field-trial-handle=1884,i,1563614005361254263,18316954134056111958,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD524c9913a83d5ea2079bb4ad9ae7346cd
SHA1e3b92add8ba24c0c391aec411d67ee9fda8b30ee
SHA256d7fb5a60246ddd6ff696ec7256f89ea5c9b93f751ebd9f7b34181902e6c6f4d0
SHA512681d60e50d33bbc7f4bf4ebd55ca3cbea8e109e3fd55852ecba0127401f1faa6781ba8f726164e5a4b2587477c6c66adaf89365794f1484705e041aa2b147189
-
Filesize
2KB
MD53d7239744a127a76726bc244526544dc
SHA14e1f8f5d28b8104acf76cc3c6ab0edb20fc798bf
SHA2563c9ce31e208067b4df710b6f46ed2ecbe5b292d4bf72918c5870c804ce55b09d
SHA5122c813d5f15add2a3e6ee99b6dbc5181f50c7166fbb86c3f53452ce5344ce23f9207935a2e28b1c6698a08e8784a928ee805d925450195475ffca84324749caf4
-
Filesize
1KB
MD57cb9c9680fad90cd716f8f952d675ab5
SHA1af477d5f9fed08a52f1ddc355912fe9bfcebc459
SHA256a41ce32f92b386d30716e825843910d9c875030dffb3599036436ba53e3ba0a9
SHA51213d9514f26dbc67fe12df4ab98ef85792ac145b1b78025a39cfc9d45297006faad51b2660e968eb18e867b8f1fd5ae1127b667f48c0c0b4c0320da2fa71fa1ea
-
Filesize
6KB
MD55068f1d9a8f0fe3d6aef187f9d63b755
SHA1fc85f1b17bb095d66792736bdff5c4ee661fcbed
SHA2561beb49bf46f930f98b3e9988f7144d31ad3b746de7fd28408e8dd6f5ac7a80a5
SHA5129c8504a876b8f59e2392346e3d2a0896f630edef05531f28bce2edaa746f05911e82c3883457380c74716dcd9845b64fc8d3ccca9626c4014e9b2041704370ba
-
Filesize
128KB
MD568fbed77437114b1837e01cbd6eaa9ea
SHA1c43c55f38b4cc8650b1028060a765855f40b8692
SHA256bf39448935949a326c694aa94ae53de62ee7eee87632f205d8ed504fa543ea76
SHA512452259aaf5f596d33b7e1432f07565cf0175ee30a398671c93c2cfa86c5e0b5e6235e4b2e10370d84d29f347e23cd89aca7dca9b9e166d49a3256c49d0fc6338
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd