Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
14/03/2024, 00:06
240314-ad7pysde41 114/03/2024, 00:05
240314-adlsgsdd9z 113/03/2024, 23:59
240313-31vywsdc7t 1Analysis
-
max time kernel
90s -
max time network
91s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
14/03/2024, 00:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://2fa.com-token-auth.com/XVEZWak5IRjBPV1JpU3pkd2VXWTBUbk0yVEZwQlJVTkxXSFJTVERFeFVtaExjMEprTDI1U1JXMURXRVUwUkN0eVIybElSVkZUWjFOTk5rRmlkMVo1TDJwT01UUk1jVlo1UkdKMWNXVmxNM3BqVkdObE1VaFRSR3BWUTNOd1dXTXhjbEJIZW14YU9XaEdWbVJySzBRckswaEhTMUJRVjFWM1RuUXhSR1phWWtwQ05UaHlNV1l6YTAxTlpGQmxiVWhyWkZweWNWRnRPVnBGYlVkaVlUWXJRV3B4Tld0UVdrdFJOVmxXVkhRNGNsVjBkVUo1U200eWVIRnBMemM0UkRCakxTMTNUekIxUTBrNGVXSjZUa1pXUVdkVWExTmxkRTkzUFQwPS0tODcwZWE4MjMyZTdmMWVjNjA4NWVlMTMxYTAxNzBiMjQ4MjgxYzBjMw==?cid=1887248764
Resource
win10-20240221-en
General
-
Target
https://2fa.com-token-auth.com/XVEZWak5IRjBPV1JpU3pkd2VXWTBUbk0yVEZwQlJVTkxXSFJTVERFeFVtaExjMEprTDI1U1JXMURXRVUwUkN0eVIybElSVkZUWjFOTk5rRmlkMVo1TDJwT01UUk1jVlo1UkdKMWNXVmxNM3BqVkdObE1VaFRSR3BWUTNOd1dXTXhjbEJIZW14YU9XaEdWbVJySzBRckswaEhTMUJRVjFWM1RuUXhSR1phWWtwQ05UaHlNV1l6YTAxTlpGQmxiVWhyWkZweWNWRnRPVnBGYlVkaVlUWXJRV3B4Tld0UVdrdFJOVmxXVkhRNGNsVjBkVUo1U200eWVIRnBMemM0UkRCakxTMTNUekIxUTBrNGVXSjZUa1pXUVdkVWExTmxkRTkzUFQwPS0tODcwZWE4MjMyZTdmMWVjNjA4NWVlMTMxYTAxNzBiMjQ4MjgxYzBjMw==?cid=1887248764
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548484528880678" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 440 chrome.exe 440 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 440 chrome.exe 440 chrome.exe 440 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 440 wrote to memory of 3276 440 chrome.exe 75 PID 440 wrote to memory of 3276 440 chrome.exe 75 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 1496 440 chrome.exe 77 PID 440 wrote to memory of 3924 440 chrome.exe 78 PID 440 wrote to memory of 3924 440 chrome.exe 78 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79 PID 440 wrote to memory of 2568 440 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://2fa.com-token-auth.com/XVEZWak5IRjBPV1JpU3pkd2VXWTBUbk0yVEZwQlJVTkxXSFJTVERFeFVtaExjMEprTDI1U1JXMURXRVUwUkN0eVIybElSVkZUWjFOTk5rRmlkMVo1TDJwT01UUk1jVlo1UkdKMWNXVmxNM3BqVkdObE1VaFRSR3BWUTNOd1dXTXhjbEJIZW14YU9XaEdWbVJySzBRckswaEhTMUJRVjFWM1RuUXhSR1phWWtwQ05UaHlNV1l6YTAxTlpGQmxiVWhyWkZweWNWRnRPVnBGYlVkaVlUWXJRV3B4Tld0UVdrdFJOVmxXVkhRNGNsVjBkVUo1U200eWVIRnBMemM0UkRCakxTMTNUekIxUTBrNGVXSjZUa1pXUVdkVWExTmxkRTkzUFQwPS0tODcwZWE4MjMyZTdmMWVjNjA4NWVlMTMxYTAxNzBiMjQ4MjgxYzBjMw==?cid=18872487641⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff96d0e9758,0x7ff96d0e9768,0x7ff96d0e97782⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1812,i,3194435834764738938,1868264350615297552,131072 /prefetch:22⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1768 --field-trial-handle=1812,i,3194435834764738938,1868264350615297552,131072 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1812,i,3194435834764738938,1868264350615297552,131072 /prefetch:82⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1812,i,3194435834764738938,1868264350615297552,131072 /prefetch:12⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1812,i,3194435834764738938,1868264350615297552,131072 /prefetch:12⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4564 --field-trial-handle=1812,i,3194435834764738938,1868264350615297552,131072 /prefetch:12⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1812,i,3194435834764738938,1868264350615297552,131072 /prefetch:82⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3088 --field-trial-handle=1812,i,3194435834764738938,1868264350615297552,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD520f83cf443d8bfc4088d1c51e8c31d68
SHA10d4cdf9ff6e9e2ccb37d744e0e5bc3b0b96a7ad5
SHA256c9846d9fe4ba7c75286fbc3b3b90923e9cb515cadd9034d37582af0b079e3d51
SHA5124fe3d39b69963f06327daaa1b4dec3dde3f21a48a54f9588336b6c8ded068ab073f4ec1ed2d829656835993421eae8e15e9db86479e6e28ee06bc91bce59c391
-
Filesize
2KB
MD5608b86ee89150010827266b1a54db60f
SHA1c0c94d1c469325b4041395ddea73fa8d8975864c
SHA2562981c6b49dbb8c214b1cbe26d89e2af082d0c78960038e4f28027b5a26e3f27c
SHA512f4732ca3c31045ce7786a1e54f7e9d04127cd65135f250d44a9b8ca6eb1e192942361542d7a68c2ef433a96947648cb95e2ed866e1c549752e3d39bd0e111aa9
-
Filesize
1KB
MD51f698704c8ee36680dae29992814484a
SHA152093474a00be814ad2ec8356d8fc1bafee8bf61
SHA2562421e0628b7a7b114cde7aefa751902489cbb25407e1540dcc4b8cab743361b7
SHA512d8d9f9571b8169a6d70610faeb782bcc2682961c6d39810ac1258925c588ac96b41e2d141f8924b3047c39e9c9de9d62c05c537c9c999346b938b86993627e9b
-
Filesize
1KB
MD510d75a07e7ea9a5ff4fce90c7f1d250b
SHA1c48aa3f91e015c4403a8d6a14ce85bcd27a2dde5
SHA2569e90f4a0c5efa196a5761d07b18b087072d90ea30ede3496756d7b7c17648d79
SHA51282c1dad6b19bf2eb8174c6b0e68d1b337e14de82565dc5070bf29f9a1a402a7e3e0f6d95d8516d9e6c9cc117ee774577a78080c105a9445049be22fb192d2771
-
Filesize
6KB
MD5c24f88be0deefefded27c9660bd444e4
SHA11074f551b837885cf9767ab317c5e951ec0955c3
SHA256e82ff3e5e01aebe7cc7afd43eba94eb0394b0649691ad2982cd7679a47a709b4
SHA5123dfb565d46b581b36f1e21f9c982d561bd20f989044643cf115d9d41662a5541cb30c28ccd8e61dc3b9af3a51ff0b485e5cdf55596de46af2f477f060ab29ac5
-
Filesize
130KB
MD525eb6121ca891ad90fadc7423592483a
SHA1fa8417716ff8453022874c0dd50a866fec123b4d
SHA256fdda35dbd08ed74c1b84120539855953a421f6e3aa68b23eb3c4708c43978495
SHA512f795383c11081c52b7f906caa84df9c3041dc7b864e3ff42a4b3e2bc1a438ee376ab8532c8a10581ab4e29a7033220cdd3ee305b39dc537c887a94e85807af54
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd