Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 12:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient
Resource
win10v2004-20240226-en
General
-
Target
http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548067239029673" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe 4576 chrome.exe 4576 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 3968 2136 chrome.exe 87 PID 2136 wrote to memory of 3968 2136 chrome.exe 87 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1072 2136 chrome.exe 89 PID 2136 wrote to memory of 1196 2136 chrome.exe 90 PID 2136 wrote to memory of 1196 2136 chrome.exe 90 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91 PID 2136 wrote to memory of 2972 2136 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3f209758,0x7ffa3f209768,0x7ffa3f2097782⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1856,i,15817635119791154728,4001517782855052192,131072 /prefetch:22⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1856,i,15817635119791154728,4001517782855052192,131072 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1856,i,15817635119791154728,4001517782855052192,131072 /prefetch:82⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1856,i,15817635119791154728,4001517782855052192,131072 /prefetch:12⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1856,i,15817635119791154728,4001517782855052192,131072 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4016 --field-trial-handle=1856,i,15817635119791154728,4001517782855052192,131072 /prefetch:12⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5036 --field-trial-handle=1856,i,15817635119791154728,4001517782855052192,131072 /prefetch:12⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 --field-trial-handle=1856,i,15817635119791154728,4001517782855052192,131072 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 --field-trial-handle=1856,i,15817635119791154728,4001517782855052192,131072 /prefetch:82⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1856,i,15817635119791154728,4001517782855052192,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528B
MD5c1ecc1414847420e46d09c2bb5a59747
SHA17c87ed1194eb88af201d8194dc032babd15f0cda
SHA2562adae5c64d7d511398a6416841fd6093bbfc172e17ccac12b128b8605eaa2150
SHA512fbf6684a3747507ab127af6d793878be74491442c90903b57ebf2003e8b811223cf3c92d4105cdb41c1edccaa1ee30f3529afd441a438dd11ab1d0237cf5d790
-
Filesize
3KB
MD596d1bb26c03ba67f85207ef70e7201ee
SHA1372927794de7ca165c8a9b15e70eba03346ea857
SHA256ce4a369ed7dad93b1195e7ce6b04e3a5d61b5f72335f9e27ca91c1b289ec0cd5
SHA51200cb2ab7a61ee14ecfc087c898eb546687339596b3aa135e3d3d6e2771687128c35e6268a0038e93c712021497a6fcdd3f689f23428a225fdc7042c794c319e7
-
Filesize
2KB
MD5c1fe8a5e4a8fbaae05121b0535fb7cdb
SHA1a0c0eced0751e999aed53d51089aeb4c064d6980
SHA256719b652e022efac350fd1767cae1d51f538bb65711b9557f727cf487aafa21b4
SHA5124b2d53f97fa9379731e70ba9f4f0a8684969e205aa04fb0d047fac2dfbc5f859e61a1cfa62e7725cee3ff3858903e8d6b428fd7cb1ba40dc912090338fd4b1c4
-
Filesize
6KB
MD5bd5c28b4a62839a44f08b191cb14c126
SHA1d5150c445f43c658dbd779a9f245ed9c723f9d68
SHA256777f6e8053b8b90cae438d3efcc883114b6e5e0eb47785d809f0c29362938ceb
SHA5123b498ac963aaaf069b668c53d00147aff434e3f7e59f6039cec6a4af2276dcd59e3ba28e32d7c831fe7de01c9e9b1fdaee6fa229c759447b597632a2bc2ecfa6
-
Filesize
128KB
MD5c771799bdfeccabc60ff5461d7f40a90
SHA11e98c30b3a4c12fd4450d6da194f9cd472866030
SHA25662abef745f88a7d0c7c185d91fe24edb6e269e288a843f3a62adc76c491a2c9a
SHA512e5fbd8e9058bcd6a7038f5a9874ff0412d04a75c2516bf88b9e4d3da308206aa7d423d89f02ef913c77d5289e82425b6660de5bc0c32484fd9114a9cbb45f325
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd