Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/04/2024, 20:47
240409-zk7qzaag79 109/04/2024, 20:46
240409-zkkansec4v 109/04/2024, 20:43
240409-zhpglsaf93 109/04/2024, 20:40
240409-zf7v6sae88 1Analysis
-
max time kernel
79s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
Encrypted-PaymentAdvice-Reference (1).html
Resource
win10v2004-20240226-en
General
-
Target
Encrypted-PaymentAdvice-Reference (1).html
-
Size
1KB
-
MD5
d518664141c76f578be9bd77a87da8be
-
SHA1
18b5e80b365eabf607350a934521181dc64651f2
-
SHA256
752dc035519e56f67f73da13233c6af3f7655ff29f56f7cb03afb307fcbbb49f
-
SHA512
6a22e7978f66ed431ccb5a98d36ffbbb6a50c2c9958bd0cee5f9adf30ea53f4ef246fd8b6dd034ce60dba584938fe221a80e26a7024e38fb08726319686f8245
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571688790284343" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3892 wrote to memory of 4524 3892 chrome.exe 86 PID 3892 wrote to memory of 4524 3892 chrome.exe 86 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 2920 3892 chrome.exe 88 PID 3892 wrote to memory of 3800 3892 chrome.exe 89 PID 3892 wrote to memory of 3800 3892 chrome.exe 89 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90 PID 3892 wrote to memory of 3388 3892 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Encrypted-PaymentAdvice-Reference (1).html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb6869758,0x7ffcb6869768,0x7ffcb68697782⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1892,i,9531748147813020490,5420282184299145573,131072 /prefetch:22⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1892,i,9531748147813020490,5420282184299145573,131072 /prefetch:82⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1892,i,9531748147813020490,5420282184299145573,131072 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1892,i,9531748147813020490,5420282184299145573,131072 /prefetch:12⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1892,i,9531748147813020490,5420282184299145573,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1892,i,9531748147813020490,5420282184299145573,131072 /prefetch:82⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1892,i,9531748147813020490,5420282184299145573,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5204 --field-trial-handle=1892,i,9531748147813020490,5420282184299145573,131072 /prefetch:12⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3276 --field-trial-handle=1892,i,9531748147813020490,5420282184299145573,131072 /prefetch:12⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:464
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD512e3dac858061d088023b2bd48e2fa96
SHA1e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5
SHA25690cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21
SHA512c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01
-
Filesize
264B
MD5c2a67dda0f1712076410cda96d97d283
SHA17487a4ca063207a0a3cb23f46157d45bc9f9bd73
SHA25698bae852ad85d3e7879e157a65d04dc00f8cffd58a6a9aa5c3c42ecaea138326
SHA512f8e2619e5ecbf9c55616918a65cf13b22c0400e9a51be90718683482861f69e4a973262a3d5c6f24601a2d4b492d7de69cc67aeb95408e9be6207786af568307
-
Filesize
1KB
MD5022f6c382abe0c0637818b98a61be70c
SHA190e7bddafebbdebdeabeca58da9909d8a80285dc
SHA25604a9a74fd723d9d837e66a838274b66c800cc927108ab0f93fb00215f296fafc
SHA5125d6f53853d509cf52264d805199c8d0b3b720c449c5d077c7246d8d09cbf84525e7e0dea7300c0db8857b17af7f124003a5fac1d042f70bf09d9c8aaed65eed9
-
Filesize
1KB
MD5eac249c07f69161c7eed9bcf5c5db8dc
SHA1c4675e6610a3d71bf0d369160c89a62199dacec7
SHA256c8f3e9facb0a7d719698f29bc4a1b46360e24cac05c88730eee29fc988f81b94
SHA512b4de082670f88674b4cbc6f26e9058a7b176a4f84654157755a2f279f5fb00afa9736a815833decb084268dd701643332e933fdc7df256fd35aaee6532acd053
-
Filesize
703B
MD5a7edcd61670dc427d4551c3b01e473d7
SHA1d6bf5a9ed4c166efd44e95030a355c47d3565f5e
SHA256fd375bc2e29cf88221c16e4dbbe92a2e5e8133f01b053a4a4ca78d3404044cf8
SHA512cbeeee252790749e7853a8be1a41652e6de87764d448b0872876b572795e9652d46bd43882bb6e4e92255b43ff00bb8c9ac1033ec15be3cecb00bb89f96915bf
-
Filesize
6KB
MD5b234fb3e52b9c186b5d90ff1ed1e7703
SHA11097b05448388854b19e6e866d84701a296275c8
SHA2562450a76436921ea76acfb2bd9608d83515cf6f6e3d59bc4ac6d8eabd14ade254
SHA5121804e53374f5354c736d1eb1cf562b59455db681142f42ede15a5fe68a1c18c72c9fad598690905ecaf8ac66fda4cb2d9b6744012be3f0b8ff040d7a8637f097
-
Filesize
6KB
MD523f19350a2da7cec02852e89e4ee4c9f
SHA19801bdd250564ac6504161183d5c166b98c1198f
SHA256373baaa16470ed2d93fdbe12501a14e7f43ed0a851593c8d276cb896feff4695
SHA5121b100a54124ef3483fec0dc9bdd5ad11ac98ad82aa1675d88787c48698d516cd3ab9db99b252381695879905df0e0ee2fde105fe238328c7c33f609b96c53bd6
-
Filesize
128KB
MD519d78713e0ee2c4bf3f8f5054220573c
SHA1bf5a7f53cb66cf79f750199b1338caf31619bf0f
SHA2567221d12d0bf72e075080207cce1d8695fec6bdab9be6750aec8c8e783654e091
SHA5126c6d37aaba2f5e329083287b08665feab8bfd6229fc646d79fb6734bc0162aa812efe3cf1834578a637bc8483eb8a9751d82684bc807442dbc8a7e42a6af921d
-
Filesize
128KB
MD55fa096b2f0be80f4706eff5de1da2acb
SHA1dbb30408a6dd094fa6cdb4bc0833a17a158f69b5
SHA256721e11d3699f16d368e8c9fc3dbfda2125b01ea194a7d56529024737500e6d07
SHA51237eac6bfbb367e99e65b6954d795c7ee18207a912984b577583ad479aeb9efbe94e65223b38eefbbc10ace42f7130fbc74e5e83a92fec3e3a1f83c1153a54258
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd