Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/04/2024, 05:46
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vibrantmentalwellness.com/wp-content/mode/excelpro/[email protected]
Resource
win11-20240412-en
General
-
Target
https://vibrantmentalwellness.com/wp-content/mode/excelpro/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578928487192927" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4900 chrome.exe 4900 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 3336 4972 chrome.exe 77 PID 4972 wrote to memory of 3336 4972 chrome.exe 77 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 1516 4972 chrome.exe 78 PID 4972 wrote to memory of 4576 4972 chrome.exe 79 PID 4972 wrote to memory of 4576 4972 chrome.exe 79 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80 PID 4972 wrote to memory of 1248 4972 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://vibrantmentalwellness.com/wp-content/mode/excelpro/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffec9b8ab58,0x7ffec9b8ab68,0x7ffec9b8ab782⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1804,i,14854801045507201961,14646054264607821706,131072 /prefetch:22⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1804,i,14854801045507201961,14646054264607821706,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2100 --field-trial-handle=1804,i,14854801045507201961,14646054264607821706,131072 /prefetch:82⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1804,i,14854801045507201961,14646054264607821706,131072 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3308 --field-trial-handle=1804,i,14854801045507201961,14646054264607821706,131072 /prefetch:12⤵PID:424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4276 --field-trial-handle=1804,i,14854801045507201961,14646054264607821706,131072 /prefetch:82⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4056 --field-trial-handle=1804,i,14854801045507201961,14646054264607821706,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1804,i,14854801045507201961,14646054264607821706,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5582b6a5086b6fa04657db688989b0bfb
SHA153f3dec1563f4674f099e6ca110af5428bfd3b97
SHA2565989de3047ec851115a7188b8be3e8e0cfeeca11a3bb5a84224c486421d7c279
SHA512cb8eb587cacc0446da7b85e2e9d9d4805b5ae6947a13924654d69937c7c2303a44ee82eb5de001e933d4e7909b6e445addb9be070929eecbbea4e34d7f09f337
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD513757454395f6906b7886845305d7603
SHA1a65c14bb1c7e5a6a96da162e5bf7c344d73bf7fc
SHA256d4ff4db749511d714bd7a42b2e0ec2b0b953a14d948c86f1cd42e7ae0230d03f
SHA51293f4fd5af573ba543173563f30f6ca94ece10e816b50ab824101149f94cac243512559a8d2a44fb354f428da5cebd61951515e7c1fb817cac61e15961c8b182f
-
Filesize
7KB
MD55769f7eb35029c81dcb74e4dd2b0513b
SHA1d8fc47d0d159a63f9f3aaaebbfd851fac1bb9e3d
SHA2564534658943ba249ba9de2860291dbaf3fbc1caa66466d58d0c1d0c489ebd411c
SHA51262efa0cb35f5d85055bd42c1ae677a73331c50702e4957055df394cf655d769287a1b8b71a5144b530f43a2a1cc7c98772377d243cef6ff134848b18d63b087d
-
Filesize
127KB
MD5cfefddd2f784862303dfcac2d291a066
SHA1e344cae75a86d07f5204bf917f124ef3cc394ed6
SHA25672e859f5af0d1a7b5ef4b1dd5a0bbdb84ee9211359d6d3925b18270f4a89321c
SHA512e5b0c708324f74b8fe28b704c6d5b186e8e2b60fdceb9ca199401eddf205bd4e86a2c400fbb4603a3c6d5099ee0f51aa2745d55fba8fce2cced5bcb0f7f5fd91