Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 14:31
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://y3r710.r.eu-west-1.awstrack.me/L0/https:%2F%2Fdmp.politico.eu%2F%[email protected]%26destination=https:%2F%2Fcommission.europa.eu%2Fdocument%2Fdownload%2Fbebd9b72-fbb9-42f3-bcea-dbace7e0650f_en%3Ffilename=Code%2520of%2520conduct%2520for%25202024%2520European%2520elections_final.pdf/1/0102018ec33a0eaf-04c045e6-d004-4670-ac7b-5e0bbca7bb15-000000/5xHW008vZ8J7AZLkdgkeUZAikZo=368
Resource
win10v2004-20240226-en
General
-
Target
https://y3r710.r.eu-west-1.awstrack.me/L0/https:%2F%2Fdmp.politico.eu%2F%[email protected]%26destination=https:%2F%2Fcommission.europa.eu%2Fdocument%2Fdownload%2Fbebd9b72-fbb9-42f3-bcea-dbace7e0650f_en%3Ffilename=Code%2520of%2520conduct%2520for%25202024%2520European%2520elections_final.pdf/1/0102018ec33a0eaf-04c045e6-d004-4670-ac7b-5e0bbca7bb15-000000/5xHW008vZ8J7AZLkdgkeUZAikZo=368
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133572330779459334" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 2260 chrome.exe 2260 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3760 3016 chrome.exe 86 PID 3016 wrote to memory of 3760 3016 chrome.exe 86 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 3988 3016 chrome.exe 90 PID 3016 wrote to memory of 5052 3016 chrome.exe 91 PID 3016 wrote to memory of 5052 3016 chrome.exe 91 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92 PID 3016 wrote to memory of 4916 3016 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://y3r710.r.eu-west-1.awstrack.me/L0/https:%2F%2Fdmp.politico.eu%2F%[email protected]%26destination=https:%2F%2Fcommission.europa.eu%2Fdocument%2Fdownload%2Fbebd9b72-fbb9-42f3-bcea-dbace7e0650f_en%3Ffilename=Code%2520of%2520conduct%2520for%25202024%2520European%2520elections_final.pdf/1/0102018ec33a0eaf-04c045e6-d004-4670-ac7b-5e0bbca7bb15-000000/5xHW008vZ8J7AZLkdgkeUZAikZo=3681⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa93d9758,0x7fffa93d9768,0x7fffa93d97782⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:22⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:82⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:12⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:12⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4684 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:12⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5032 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:12⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2868 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:82⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=952 --field-trial-handle=1860,i,6688182131726236867,13836397731138361651,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
946B
MD52192597eaf1dd1eacc9618922c8a496d
SHA11f3a0cfb34cd4d070438779cc4ce78cf42fac26c
SHA25683e27cdb6cf12cfc2fce1f92ca0e7cd683442ba241f6fc05e315c520785e0aef
SHA512d1986b64c7307540f5e1bd9f7d4f7a2fb5824c66a0706c30fb87c4ce32b86c2ea8e690c7c4fab9715f441746ba7bd1d9f9c9e3e645827fb049e31e3e1e61ab81
-
Filesize
706B
MD50d870dd555b71215ca7044db68635140
SHA1b73462789d2c784cfc051de1f2b2e7a9b7c7fb55
SHA256f0732afde8cacaada4a9a9c0185a2e8968183d7abfe3a7bee2ca93d7772034cf
SHA512e98a62721bf77738ff1743d66c46623bba6b1fd2731b87b21e0e0bc42e2a091be4c86db4bcf5a736638cc641c9c67276a239c87d6b6f0ef6eeea6b53b49dca7b
-
Filesize
6KB
MD5b422787546ca4457b784823bd283b21b
SHA113ed2d54d7ee28cb4c8f11d173210d152bc2268c
SHA2560e230225c580556a4c59eb42ebafd2e7f127d4fed97c0e39fefb816933733fd3
SHA5129b560127f764c26c23bcf5a1e444475c1d24f2ad77bf646b8600adeb8929e778890a9357cc885696f7bc35f5197a115062f0630df910aaed820ee3330bfdc467
-
Filesize
128KB
MD56fe508e2722307402348c2fecf1bc554
SHA15a79cdeb7602d03530ac2f8ca50faac54606630b
SHA256dac42df04b48df70cb09a77ca32edf1a0a50759c9f3e1bbe939fe4300fb9de44
SHA512b9a15a433307562a9fa6201278b5538ff2cc576edd279c19d74674eaf3d677bf6c5340deda36616c33a9db33997d2de3d1f93607e5f3e7f7f871b47e2ea4b0e6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd