Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 04:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://321pdqwf.r.ap-south-1.awstrack.me/L0/https:%2F%2Frbdvn2ejwgybh7mc.reportsandstats.com%2Frvf%2Findex.php%2Fcampaigns%2Fcn113e20oadba%2Ftrack-url%2Frn2183tkao3e9%2Ffa83a75d9f44633367e95902c23e19623dd4108c/1/0109018e7c3ea497-797d83f0-1a20-4868-a006-fc8ad8fd4847-000000/iJcVDesSAlZdh_NJvrS8kdmAMMU=148
Resource
win10v2004-20240226-en
General
-
Target
https://321pdqwf.r.ap-south-1.awstrack.me/L0/https:%2F%2Frbdvn2ejwgybh7mc.reportsandstats.com%2Frvf%2Findex.php%2Fcampaigns%2Fcn113e20oadba%2Ftrack-url%2Frn2183tkao3e9%2Ffa83a75d9f44633367e95902c23e19623dd4108c/1/0109018e7c3ea497-797d83f0-1a20-4868-a006-fc8ad8fd4847-000000/iJcVDesSAlZdh_NJvrS8kdmAMMU=148
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 94 ipinfo.io 96 ipinfo.io -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559866107043713" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 552 chrome.exe 552 chrome.exe 1496 chrome.exe 1496 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 552 chrome.exe 552 chrome.exe 552 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 116 552 chrome.exe 89 PID 552 wrote to memory of 116 552 chrome.exe 89 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 4480 552 chrome.exe 91 PID 552 wrote to memory of 776 552 chrome.exe 92 PID 552 wrote to memory of 776 552 chrome.exe 92 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93 PID 552 wrote to memory of 3244 552 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://321pdqwf.r.ap-south-1.awstrack.me/L0/https:%2F%2Frbdvn2ejwgybh7mc.reportsandstats.com%2Frvf%2Findex.php%2Fcampaigns%2Fcn113e20oadba%2Ftrack-url%2Frn2183tkao3e9%2Ffa83a75d9f44633367e95902c23e19623dd4108c/1/0109018e7c3ea497-797d83f0-1a20-4868-a006-fc8ad8fd4847-000000/iJcVDesSAlZdh_NJvrS8kdmAMMU=1481⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae68c9758,0x7ffae68c9768,0x7ffae68c97782⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1892,i,12650120441925500303,8572966717520220536,131072 /prefetch:22⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1892,i,12650120441925500303,8572966717520220536,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1892,i,12650120441925500303,8572966717520220536,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3108 --field-trial-handle=1892,i,12650120441925500303,8572966717520220536,131072 /prefetch:12⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3140 --field-trial-handle=1892,i,12650120441925500303,8572966717520220536,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 --field-trial-handle=1892,i,12650120441925500303,8572966717520220536,131072 /prefetch:82⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1892,i,12650120441925500303,8572966717520220536,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5708 --field-trial-handle=1892,i,12650120441925500303,8572966717520220536,131072 /prefetch:12⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 --field-trial-handle=1892,i,12650120441925500303,8572966717520220536,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552B
MD5c63f9894e25964bcf72d486d1c9f7d4b
SHA1d8de27f3e547035f1a0f3be5debff2b4f502279d
SHA256d74741b33b63eea215bef4dedff99f06eba96a2a43e0337c71b826777e2351ee
SHA51273e130f2c3866eaf353aedc6282ec35ec737d4f6090524f29f553c49b4f8ea3a117ea5bdf3a06fe36b979de2d74490b01e30aeefa890103e51b515d0cfbb4081
-
Filesize
3KB
MD5be71192549ea042097f95e223a973473
SHA12a569e77a06181a609bedec9852f1fd08b829f01
SHA25697fd4570a9b07113dd56f5847056ea5149fe143b2ade23d24c7650637adcaaae
SHA512306c7f5628bd325f57d802dbff25ce4e062ca331a7eefd01f99d4376ae12e16944f0e9619883ca8fa5e0a30932ebe973ce193fed6bbaf074da4ac338b3347aaa
-
Filesize
1KB
MD5c9db575972cb139b037b3fae1606a7e7
SHA10b3e79d334e9f8125a0fc39d4b9c907df88a373b
SHA2567deb68475a13fcea8bdadb57c0a858a6dc2f04552d3250f875c56574c3640369
SHA5121a9cdfc1a857ae19c895aece9935b0bad5fbb3db833e56ad16a22dfaee29779afa1294c68ac5c67e09c0dbd9d0d8eeb3af936a161d97aea7016e0a638d6796fe
-
Filesize
1KB
MD52b136951d407adc0722ca5c1735d904a
SHA10ef2b97a340ec611c53b35527cbd859b8a80699b
SHA2565d2b70f060c65743e12e613f2a6e32d58d19dcbbe5a276ad08c1de43af70f868
SHA51255edda30eeb1d3ff2baa537722380d83a9d613c759038dcd28aa552a77589c755214e693a20d91a30556f7e7c9050cdfbec4e9a32e4392a5375f03980f3bf830
-
Filesize
6KB
MD544f42ff61be2e3203a28a724905f9c5c
SHA1a84617d4a1033af770c7b57939651140c94a82cf
SHA256d89fd48a7a400e586e60fd9d75338e760e7975faddd0aa0394bdc4b0baa1e358
SHA512faa4bf11ff79cadc01a55949f18c23e8c4a7f24499e2f860f1ca6e4447d7fff541c6c1dcca17b17938db5e9e8ddb38ba924e69dfde733c17a3c66655e295d449
-
Filesize
6KB
MD5ed0dcd751135bb43fe223294ec7ae423
SHA1f332d5a1fb9040753cfe92b0be54b180aea76fa5
SHA25658eb151b54908ce23b50b58f15687e7e61f2ce050903a88380dbd4082d5e3f27
SHA5127cd88150e78dbaf0fce289f7cd30e929ad673a6904412abd31769fdf1376454b2fb32262aeb2f8f6614b1ee008c74926f80c0c058697d41daaced22f10edcf3a
-
Filesize
128KB
MD53a057ccefeb39db0bb9c1fc0d56aefb0
SHA1ae4b6038af4fba98f9a4315d92d5138c3d8bdfc1
SHA256cea1d9e5b18fd896f54577df22071e545a3eeb11105b9668b1c4dfaba428b8fb
SHA512f3af6bb01690786bc685abe4606cb391b9252acc78ed4c9de9dcd1fccac957e9db921fa8f15357467604a4d64d4b6192e272792099bf263947996983608ada00
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd