Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 00:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.docusign.net/Signing/EmailStart.aspx?a=091a2715-1cc0-4fb5-a3ab-8d8b17821fd5&acct=b043ccc1-c33f-4e73-b66e-f50c4915530f&er=657501db-faba-478b-8494-e8490a514b84
Resource
win10v2004-20240412-en
General
-
Target
https://www.docusign.net/Signing/EmailStart.aspx?a=091a2715-1cc0-4fb5-a3ab-8d8b17821fd5&acct=b043ccc1-c33f-4e73-b66e-f50c4915530f&er=657501db-faba-478b-8494-e8490a514b84
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133579608790082864" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe 1492 chrome.exe 1492 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 1224 3924 chrome.exe 84 PID 3924 wrote to memory of 1224 3924 chrome.exe 84 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2392 3924 chrome.exe 85 PID 3924 wrote to memory of 2208 3924 chrome.exe 86 PID 3924 wrote to memory of 2208 3924 chrome.exe 86 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87 PID 3924 wrote to memory of 2284 3924 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.docusign.net/Signing/EmailStart.aspx?a=091a2715-1cc0-4fb5-a3ab-8d8b17821fd5&acct=b043ccc1-c33f-4e73-b66e-f50c4915530f&er=657501db-faba-478b-8494-e8490a514b841⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb7036ab58,0x7ffb7036ab68,0x7ffb7036ab782⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1892,i,10162335045156802970,9803211956031932431,131072 /prefetch:22⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1892,i,10162335045156802970,9803211956031932431,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2184 --field-trial-handle=1892,i,10162335045156802970,9803211956031932431,131072 /prefetch:82⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1892,i,10162335045156802970,9803211956031932431,131072 /prefetch:12⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1892,i,10162335045156802970,9803211956031932431,131072 /prefetch:12⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4388 --field-trial-handle=1892,i,10162335045156802970,9803211956031932431,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1892,i,10162335045156802970,9803211956031932431,131072 /prefetch:82⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=980 --field-trial-handle=1892,i,10162335045156802970,9803211956031932431,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD51b56cd40d6421f3c3a2f25b1d0f50c46
SHA118a476c02ac8bc495639bff844b0d65f57780891
SHA256bfcc759adb3605d4f0dd1888820381ae8e06ffc1d84741abaacb1bc5cb2713db
SHA512b588dd0b702a686b9deb612ffd3e8ca92718fef2b577f6add5ffb50952b476e357e68327810bcb64fef2955a1bdbe0e22d449af4e9af3f984a226cc929c590cd
-
Filesize
1KB
MD57a62a4dd6ddd99a66c066fa0c013d67a
SHA1aea57a341a49d4123d09ff2dff7d967a9e14050a
SHA256fc4d98a986c6609993c23d86b4dba555ad03d880a568239a1c3b9f14390922d2
SHA512968973a87e70d95e71a317c4dcf924d60e889adb410e6026950dce8d531febc0f3f9ceea938d9fc2ff5a33aa1dda34665327c615f80739877b6667d385812ff7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD507851f4d93d8ea153bc990da13f04938
SHA1789e8060c228efd412e07389fcb9053d11b4fc42
SHA256a1e8cea69f7db8fb0c44f8615000257fe761fd9c0fcd47d040efda4a3b5829dd
SHA512e4aa290f926a8b2c88c464785aaf72998b1f130767aa93cfcf3be6ea740fd132b5af03f159861a3e1ee7f8aeb1baf1af330248a1cc8ffc64a42cee11b4ccc701
-
Filesize
7KB
MD5211afa8c10da837f26010f1394dec38d
SHA16d2587a045dfb77bb8bbce4adf11684b947562b3
SHA2564cc4e4a020e7408bdd3b399b0f997baad35515d8bcf6a35c4c1ee63fa11139cb
SHA5129b46ac0f0b3e43c5f83dd0481ee6790545617a7ba1f9cb94dbb07b44b0dd23403aef05e827eff31035d96434efcb5d8794c4812d2b2eda9d1a02446363960383
-
Filesize
250KB
MD5a1b6ff8ff4e926ffe31432c118514192
SHA122181f3ee66b7bfd45638a65800e5cbc4dc649f4
SHA25652b28f59d0a549538c4534f7321f3a983bf19f38942b68d96cceb4f7de52e5e5
SHA512d15314466d1dc8b6e32fc2e4f0cb21b5338a1a27b9763b6eaa97adf23b477407e54f98530805615702dcb344245cdb1615c9ec6288fc2abb5a435746b04f72ba