Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
249s -
max time network
258s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/04/2024, 23:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://shengifts.icu
Resource
win11-20240221-en
General
-
Target
http://shengifts.icu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571788202962754" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5084 chrome.exe 5084 chrome.exe 2064 chrome.exe 2064 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3808 5084 chrome.exe 76 PID 5084 wrote to memory of 3808 5084 chrome.exe 76 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1244 5084 chrome.exe 78 PID 5084 wrote to memory of 1936 5084 chrome.exe 79 PID 5084 wrote to memory of 1936 5084 chrome.exe 79 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80 PID 5084 wrote to memory of 3416 5084 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://shengifts.icu1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcc70f9758,0x7ffcc70f9768,0x7ffcc70f97782⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:22⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:82⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:82⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3116 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:12⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3148 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4252 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3732 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3880 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:12⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4056 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3788 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1500 --field-trial-handle=1824,i,539263638547746677,4130689941282925428,131072 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54017a58009d51a98ba2b17c954ac7e0f
SHA137ae397ccf61eecd03559b706c3b0631fb500033
SHA25675821b2b3ba2b0556a99a6399e01c18ffb4a99f5c1009279b045e66b1443b185
SHA51209c26e3aca4f205dcf7288c399f30e5e88190fc804ef61a3fcfcfb08040acf614219b9478b651a72d6a1db2ef60aa65e57c7aac460e1773f3b3902f87ceeb6fc
-
Filesize
5KB
MD5013ff13c08393b1a8999f576bca92544
SHA183bbc6b3ee2c62959e1154ae1b3d74b2e5948ca3
SHA2562899df1d9ac53d7667d502ed358dfe450e52c08fe963718751f6ace7fbe1488c
SHA5128e9fc24b37ab283a77f46f3aa52b5df5c264fd076ab9a7c28bccd867e22bca98ee916b85d367407c5ee6ee44e9c6cda3622ac2dc53055aec581061743a52dc92
-
Filesize
5KB
MD514874af6a60cd0e1abfa222f15e7cd05
SHA1c40f37b10fda9461946b284c2549d27cac085f58
SHA256158dd52f840e2ab0b75033ea64aac6e95e5c8dd591c8f7ff8f27e0777f079a4b
SHA5123b7bd8485a23d3abb7e87ee9e1a97d5615e8f4fe2f4e83ce5d7da04150617a7d5bbf5cbab52ad20a1739a72daace0f05bcf3a9753e86afc510d55c182370880f
-
Filesize
129KB
MD587a90fa72d99a3ec232adfa8cd8fed76
SHA1663676c96b88778eb9f59b10fa595f426f751ca9
SHA256ba852161f1f2dc127125c5bb819498c50996432764c965f5e93481103ae351c6
SHA512762df5ae998b04c69bf9101f2f4e8a89750e533dde1848d2d583e834f3b896507b5cf12447f87c4def4625f3ddb6d322dda630316ca285b7ae490ab586a4f839
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd