Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2024, 02:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://w2quw9sibcp-1324839608.cos.ap-bangkok.myqcloud.com/w2quw9sibcp.html
Resource
win10v2004-20240226-en
General
-
Target
https://w2quw9sibcp-1324839608.cos.ap-bangkok.myqcloud.com/w2quw9sibcp.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133553761059883127" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 3252 3160 chrome.exe 88 PID 3160 wrote to memory of 3252 3160 chrome.exe 88 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 3608 3160 chrome.exe 90 PID 3160 wrote to memory of 2424 3160 chrome.exe 91 PID 3160 wrote to memory of 2424 3160 chrome.exe 91 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93 PID 3160 wrote to memory of 2444 3160 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://w2quw9sibcp-1324839608.cos.ap-bangkok.myqcloud.com/w2quw9sibcp.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff971ec9758,0x7ff971ec9768,0x7ff971ec97782⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1876,i,9358831532934822195,1581848346372998101,131072 /prefetch:22⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1876,i,9358831532934822195,1581848346372998101,131072 /prefetch:82⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1876,i,9358831532934822195,1581848346372998101,131072 /prefetch:82⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2784 --field-trial-handle=1876,i,9358831532934822195,1581848346372998101,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2804 --field-trial-handle=1876,i,9358831532934822195,1581848346372998101,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 --field-trial-handle=1876,i,9358831532934822195,1581848346372998101,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1876,i,9358831532934822195,1581848346372998101,131072 /prefetch:82⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2944 --field-trial-handle=1876,i,9358831532934822195,1581848346372998101,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD574f19b86b4d2e3f1865418c8525676af
SHA1e797bb43746827472ebd0aa3277f4e1332e3d451
SHA2560ce92523fe78d0a60bcf6efde70e6f8d72e3ef652445fe9170435757f744df01
SHA5125abd21adbe4a462c2ccaf4bfcf86683bc18e01a7a7d480ba18827e20559f2083121984920b8ba21f5fed3d02110ccc2764d0f4731040ace7b41ef195f176d732
-
Filesize
1KB
MD5ea26ac46ab8551d86d30ad5024e62bb6
SHA12d38a290b762dcc610541f0cc797606e6feb19e5
SHA256475e910a5ff487ed840dc2734e1c443a9e62beb131d457373d7ab2e1d4ddbc9b
SHA512756c243e5376901fd3a8e8c9837b53e0d7635a800b49879af019b645d18c0d5202edf0fa1548890c07d6eddfc6c222520313006b9dba4171a363d493a69f472c
-
Filesize
6KB
MD5c11384629c030203bd9d28507f670e52
SHA175917d89f059137ce1842ffda246876f7684c4a7
SHA256646ebf5bee2bc7ec1c4c01e8e3aa46caca43c9d2bfec2df775c7426ea25455fc
SHA5129fb4095b8f8073808fd4ee6286557f548cdb8b8d12d41d9aad18d80f56808b4956fc66215b670cc5a677c1c47e2efd9520dd6e76716b5ee764bc373251b9cfd3
-
Filesize
128KB
MD51f5fae514a36b0e1a6c4b21227650faf
SHA1bf35f73c780378a48f5ca39edfa40ec0590addc4
SHA2560d312a71f0fcceff6f11bafad4be69646ca83999edfb36de75b91aad487eb53a
SHA5123b90511d5d81ad7a2b84268afa75aabec9d8a544dd523a339c35cd224eb8fb0fc5a8f3fbee3ad90f25a632e91dc803be28625d084c57879410babfa4b502eee9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd