Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
245s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/03/2024, 09:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.me/+GvndOLmkRn40NWM0
Resource
win11-20240221-en
General
-
Target
https://t.me/+GvndOLmkRn40NWM0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133553148521778179" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 1052 chrome.exe 1052 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 1744 4988 chrome.exe 79 PID 4988 wrote to memory of 1744 4988 chrome.exe 79 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 4492 4988 chrome.exe 82 PID 4988 wrote to memory of 824 4988 chrome.exe 83 PID 4988 wrote to memory of 824 4988 chrome.exe 83 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84 PID 4988 wrote to memory of 1756 4988 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.me/+GvndOLmkRn40NWM01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc07549758,0x7ffc07549768,0x7ffc075497782⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1768,i,1527323460023127931,17401290429204165373,131072 /prefetch:22⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1768,i,1527323460023127931,17401290429204165373,131072 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1768,i,1527323460023127931,17401290429204165373,131072 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1768,i,1527323460023127931,17401290429204165373,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1768,i,1527323460023127931,17401290429204165373,131072 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4672 --field-trial-handle=1768,i,1527323460023127931,17401290429204165373,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1768,i,1527323460023127931,17401290429204165373,131072 /prefetch:82⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1768,i,1527323460023127931,17401290429204165373,131072 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1640 --field-trial-handle=1768,i,1527323460023127931,17401290429204165373,131072 /prefetch:82⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4620 --field-trial-handle=1768,i,1527323460023127931,17401290429204165373,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD53908746eabbc8bd25e80727a352ef041
SHA1323a15765b1485e56260032ac13ffdeabc3e0e77
SHA256d9a843ccb97e968b6cafe1c955a630efd0839625ceea8d7f27d493fd3cc5967e
SHA51211534e50873600c305b74b9bff7a315bf7c551269c5640c1e1c5498c25d74efb588f0e18e0940b05288a1170169df4737fce7416f2a30f88abbb22b40270c03a
-
Filesize
1KB
MD5dc1b3b4cb14d054f651f725ca3f21601
SHA1464b1b2c5a1abaef1a11e610f139439448ff8428
SHA25647c8c211c9e8db6f05ae7d97cdbb6775987b60e35e28836280f33d889aa693a2
SHA512a7813c07d750bdfd9d9de3216f0ea2cafd53285ac1a851dc5cc797a9c7f2379d112f467988bdd518fec2de2d46696970e0ecbe45b21474af6863467b8d106a47
-
Filesize
706B
MD5e24d15f818bdcff5f8d67171f3479a62
SHA119dc8240b531424696c22e46b94fb8ea499d500b
SHA2560c722f250fadc336294fdb730ed33264dc5186af68996f7fd258e2fff05dfc91
SHA51297cc74aa34eb8c15f42db3af8a500f6b28b2251003ca388fb8998fe8ec333e9204d3f13afdce09a465a2cf9d0851d317e787e73fb76ebd09c706369848af0f0d
-
Filesize
6KB
MD5e33ae06933312a18863c5b93cb65a59e
SHA149f5ae84110bd5b17e70172b4dda7135a01e8fac
SHA2566f88f3b577117efd589c2206b0c3e2655cc5dce14cd7f5c1ddad013d1cd73268
SHA512f276c25553cc643afee862557d9ddacaa5a3f5d48bc62333580aa5332b7d688d3b09f1ebb4325aad84e6633e945cdea871285bcc44ff3efcabd10e089e7ed6a4
-
Filesize
6KB
MD53f6293c44705e4fb609f372311cb6325
SHA1b56aa954d934972c875f3ecf3b41204bca38ecc2
SHA256b95d05a029459df027ad5b3461a1bd01f8421beafbf38a64c3b780bdf0a7c344
SHA512810a8f3d6cffaa42723a41afd7dc724c04e5083496d43577ad410fbf9672676fdcff1cfe422e844d1f87d9fb8ae1e79027173098a5842bec7ffb4bb7fe141dd2
-
Filesize
130KB
MD535a459e1afcaf292e7c31a805e30c070
SHA158a19b8eb8576405d1eac59ace64de38f195d399
SHA256bd0e7d51d4b0b31a6d0c3bc67d93f0df93270e707da7bf1c27dfa5c16d43f285
SHA51220e1d0f73a86c60580d193bf4744a5d3604465b5726732bb0650a63322ba27ea2792525d4d61d6f461c4e248a50dd53d3b4f686c8ac1156e21dec09dbd7f90cc
-
Filesize
95KB
MD574d9c2254b9c1b5574501b85584feebe
SHA1a033b4b0609b299ea25d658867fa5140f8b973ff
SHA256a69652156ed1775ed50f48691cc5c048418a8fa822ce32b3d723b22ae7eed550
SHA51225d5cf41fcc1ae48e3b86ac1aed48a186731775a1d8cea35dc4b41f2b40a7f51567236d311b311c5ab4a4e88b29645920ff08b6690309858062bf937e98e0470
-
Filesize
93KB
MD5bfec3f529c1f749132e51bb2afa30b2c
SHA1a1459bafbdb89ff149e546c51d4008c2ecaf2a12
SHA256e9a55f9c04f485b8ef08d56dcfe72c44ee543c6679ecedd88545c108fdb8b109
SHA512ade42dc1a5053825330e425bb4b3a8abf2a35b3435d4add436beffe6a533a4d337ece143bb8a2fdfa828ae7e6a85e077681da52f0f86a37ecab3ab29ccc1eee2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd