Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
26s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15/04/2024, 21:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://relatedwords.io/vacuum
Resource
win10-20240404-en
General
-
Target
https://relatedwords.io/vacuum
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576904328916020" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1012 wrote to memory of 5048 1012 chrome.exe 72 PID 1012 wrote to memory of 5048 1012 chrome.exe 72 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 1524 1012 chrome.exe 74 PID 1012 wrote to memory of 4796 1012 chrome.exe 75 PID 1012 wrote to memory of 4796 1012 chrome.exe 75 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76 PID 1012 wrote to memory of 4928 1012 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://relatedwords.io/vacuum1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8b9689758,0x7ff8b9689768,0x7ff8b96897782⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1780,i,16668257800340551896,1455145124627642957,131072 /prefetch:22⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1780,i,16668257800340551896,1455145124627642957,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1780,i,16668257800340551896,1455145124627642957,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2840 --field-trial-handle=1780,i,16668257800340551896,1455145124627642957,131072 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1780,i,16668257800340551896,1455145124627642957,131072 /prefetch:12⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1780,i,16668257800340551896,1455145124627642957,131072 /prefetch:82⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 --field-trial-handle=1780,i,16668257800340551896,1455145124627642957,131072 /prefetch:82⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55f8d81be5d972f5af6f7499bbdc60ea6
SHA1131c5306fad63c2eee1134c819b29b2489344926
SHA25604231b647863b740006c10d62fc5a9b180c1d3f4a58576f716aa9c8825933e4e
SHA5125f59ecb4f3476161b986b46cd7a8d6dc63588ce9fe892f0d78f9ff24105e65ad2e07db87ca6244f9000ba209b20b494d3fee28df70588f1d57c622b5a7f6d59b
-
Filesize
5KB
MD5829e69d267471972edc74a8944d997be
SHA16b99c723ad65cd47933d0a355e268a69a754d03b
SHA256b30b3c4331d08b775048c5628a59aeaaa012f942c034529b62145408ce3b453f
SHA512b78e4aebada3dc76698c41b959f80a5f863c3679792c067cb8b57892fad981723e08f8232d080d489f4aded3848f5cf6aa04acc5c5bb9b7ed6db8684365ecc0d
-
Filesize
5KB
MD5136a075bbc5b00beb37c13e26d62ebd5
SHA1f1dd902d5fabc0ab087d5ab95f34b7fe26585997
SHA256eddb0690da2eedf758b83e47740b5efbb109bfa724eb46b640d9c139bb889e70
SHA51245515e80c95a1f0eb3a4473d3bc593317f5187b8401aa8e4f8e0eb7de6dbca43716707046c70581a3ce577322ec56557423695d0fbe1422ac45b81e8086c26f9
-
Filesize
136KB
MD5eafe3ef04eba31f44ddff6f22e7a7f8e
SHA16828bd3a960c6fa2c2aabad8a1805109138d4949
SHA2560affe2058795f3a9800a93dd1b3f34b8490064c5e6ef244ef4d6b54723222b50
SHA512fa2d4047e806c9186b7741a171daa6ea17188737ac0463bafdd6678bef30131d8baca7fcf81263717e6b95a565c601f6fbedc3391f726a1d0a3e1cd9d331654e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd