Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 10:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.udemy.com/api-2.0/ecl?client_key=js&client_version=27ada67
Resource
win10v2004-20240319-en
General
-
Target
http://www.udemy.com/api-2.0/ecl?client_key=js&client_version=27ada67
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133567848581765556" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 5524 chrome.exe 5524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe Token: SeShutdownPrivilege 4160 chrome.exe Token: SeCreatePagefilePrivilege 4160 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 3864 4160 chrome.exe 95 PID 4160 wrote to memory of 3864 4160 chrome.exe 95 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 3088 4160 chrome.exe 97 PID 4160 wrote to memory of 5080 4160 chrome.exe 98 PID 4160 wrote to memory of 5080 4160 chrome.exe 98 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99 PID 4160 wrote to memory of 2792 4160 chrome.exe 99
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.udemy.com/api-2.0/ecl?client_key=js&client_version=27ada671⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc89039758,0x7ffc89039768,0x7ffc890397782⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:22⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2268 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:12⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:12⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4616 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3736 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3376 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:82⤵PID:5440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:82⤵PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:82⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3744 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:82⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 --field-trial-handle=1920,i,2404145740435071032,924004180949963975,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5524
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4032 --field-trial-handle=2260,i,11662483365823245381,11064702639240765741,262144 --variations-seed-version /prefetch:81⤵PID:5152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50cb45ac39229affe3ba0d36763435ba8
SHA1da1a989947f61d0735a76ab17e11565bd117f110
SHA256a9b7c89d6b1507dfe5802bd8f814bbfdba751dc93909cd3ae4c111d8839df28d
SHA51263e75978fb3c27dc0a7477d6fc19571ba9b26fb26bfb6ec096b9e6e5fa4f4db7ed22a459b0bbcd416a70e33001fbeadb20413bb92ec26f16fd020247b7a6515c
-
Filesize
6KB
MD523f1114d755b74248222386cfed37a71
SHA1be9b4eb94b76f84b3b452f98c86db127c671141d
SHA256cd16bc5c7710885f768684a61184bd6f0d1746f1eab52da8ef66a4828c6f732e
SHA5127489d5e07a6ed51c4020da3eb77ee22f8904a12dc098449c0d7f1e73f659ce12d2a02fdfec0551800a8a38e4434d4a87efc523fac121967c38ea85ed3add12ab
-
Filesize
6KB
MD566379cc7f4ed391883f5c7a1ee32838c
SHA10390a2d636bc0620d0b3cabc3724e8a28f37d596
SHA256e2e2a922d015c82689969be87d9316d343fca89fc06f44a591a447da9e299a91
SHA5121f072380d163aaaf5494dc306466d131bb20194c6fbebd3da860d3e9013369a148c7b16c3e406736b64ece8462134a6ce460ef90be37d22fd082f81b0a94cca7
-
Filesize
136KB
MD52221cf9933217daa311dd2f74f369383
SHA1e3a37d739e86a9c285784853de01b18f457e2a72
SHA256839d3e0ceeb2469d3a7576c3c753ead5c60d91bced352259222bdd8e3a69e28e
SHA5124ac823f8919433c68cb325ee80bc33b2e5e7e453f1ea9a058220ba56db99568d0c4648ae21638c9a66442e0911b12fc309c74e65149b51c62a833f765818fd89
-
Filesize
155KB
MD5ec0faea3f1ae0a443df3525d7e3a09d9
SHA1d1336e22ed978ff7a5ab317e0ac63c5567766531
SHA256703ab7816509f870412f1daa2ae04798b2959ea4f5cb8db56e0ae80636c3dffe
SHA5121dd919c48ca5c1ddc07e4b6ff0fbb0f523068f82bf3688e43805aaed8e80a800c43f2b1ebeaa303fa96669caa0ef7f2ee5ed2a098152ecaf93ef4730afdef421
-
Filesize
136KB
MD510d6fc3d4bc75bed30ef3e220678dcde
SHA1a168f3594adbba28b321ad20894ee32a153ec139
SHA256658bb08c2af230bfeffe7c3f7c17783a9b7f7e3956d8e4f003feff640eafecae
SHA512bc24abbe04411fd4b2805fe02188496a0ce0fbaa491a54c57cfe67c561c0ddb4d77139f6021ab05a0cddd9f4b1d035154ce5df06e660f7ce1efc9b0d534f9c1e
-
Filesize
136KB
MD5030b9c002a9f49e4f04b4f87795d6df2
SHA1e8265545975d7733b064f8dc6290642d4b42ef21
SHA256e72217835bd3795403e39b433554cd386dc4330d15763ed974d199d55885794a
SHA5126c7ccd05d86220bac7964df54ba76129e4cc13c7073ce859d1a401ac2081e7b8abd42ce94ac5a4d04605802ed51a91211a33841fb93b0e16b034a96914269563
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd