Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2024, 14:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cmqa06raa8m9.blob.core.windows.net/cmqa06raa8m9/1.html?4jUzlI7406gOdm213nlelujcqhf1186VFKQCHRNUQMVOLZ165188MZJB14332W14#14/213-7406/1186-165188-14332
Resource
win10-20240404-en
General
-
Target
https://cmqa06raa8m9.blob.core.windows.net/cmqa06raa8m9/1.html?4jUzlI7406gOdm213nlelujcqhf1186VFKQCHRNUQMVOLZ165188MZJB14332W14#14/213-7406/1186-165188-14332
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133582712808977308" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2116 2216 chrome.exe 74 PID 2216 wrote to memory of 2116 2216 chrome.exe 74 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 4112 2216 chrome.exe 76 PID 2216 wrote to memory of 660 2216 chrome.exe 77 PID 2216 wrote to memory of 660 2216 chrome.exe 77 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78 PID 2216 wrote to memory of 4960 2216 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cmqa06raa8m9.blob.core.windows.net/cmqa06raa8m9/1.html?4jUzlI7406gOdm213nlelujcqhf1186VFKQCHRNUQMVOLZ165188MZJB14332W14#14/213-7406/1186-165188-143321⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffe67c9758,0x7fffe67c9768,0x7fffe67c97782⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1764,i,12044243558431860105,6513980178865952177,131072 /prefetch:22⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1764,i,12044243558431860105,6513980178865952177,131072 /prefetch:82⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1764,i,12044243558431860105,6513980178865952177,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1764,i,12044243558431860105,6513980178865952177,131072 /prefetch:12⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1764,i,12044243558431860105,6513980178865952177,131072 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4388 --field-trial-handle=1764,i,12044243558431860105,6513980178865952177,131072 /prefetch:12⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1644 --field-trial-handle=1764,i,12044243558431860105,6513980178865952177,131072 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5404 --field-trial-handle=1764,i,12044243558431860105,6513980178865952177,131072 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3004 --field-trial-handle=1764,i,12044243558431860105,6513980178865952177,131072 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 --field-trial-handle=1764,i,12044243558431860105,6513980178865952177,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5e48d1b35947c3a758810ee2ed1dd0aa6
SHA1bbc244d00d49b38d177224fa5a6f19f469c29b27
SHA2563837e0ebee98927f9ed71fbe20165d2798d349176075c8cfaff3535a44720d58
SHA5125883d14add4a1f3eb2e850975d601705a3bb4818cf75de4ec4fb7739a2616fe089f97667633ce4a395df5a61b60b9df364203e54198f4c678aa977d8e9c21163
-
Filesize
1018B
MD568863d5ac527e3a775f73155626ddd31
SHA16fc794bd9cd242d024e634c5306d29d953560726
SHA256a3dfb674a79c51c43e70782ba1601b948e1114677a783e64134102720ad960c3
SHA512041df6ff49923da6c1bf4398270fd62d75f16c085d86cbf001769907c9e9788e05a4b3eb2dbac3d541ba799a54c90ca51afcca8609c896bd8cf583f5022dec94
-
Filesize
1KB
MD56e3d6ccf045183f37fb6ffb0d0579c58
SHA1c3d610977972bbf9a30e470a0ef4f9de04f4ac98
SHA2567948948253eb29b98e57596b1961cba8d59e8c82dd7db91141e5118cbfdf9e10
SHA512e31199502b1b2e3969a02aade56c65aefe12ddd234feee0605bec7914cea05a08aa4e12b166514aea751b7c9d5ff4e998c022310c3f0bb1492e99a9c3a33c316
-
Filesize
2KB
MD594acaccb9cbbe61fdb9aac44fad67eb3
SHA134d12cf127aba3b586b8eb27f84f53dd68a2eac5
SHA256319266781b32ff51c160dfdd2b4e908a1f41f552c84ac5642d92f88166d7b3f3
SHA512e0082f08d581d511c1109439bdc0581660c735b95e1b6e2cacafc343f221cc072d2e814dc1df3dc95cb68f8e7761a0932f5fed4c5656643cb6a94cf496ef5ec9
-
Filesize
6KB
MD56b1442cdb397232ab55be6354bbfcf10
SHA1a608c80a37af1dc0dc33cdfc556c1fd3b80255a5
SHA256735310ae85dc8514979d4878def1528d380241a477f0a11fbb976aaf5b3de6c9
SHA512acb3c0972023ca0975795c8635c1ee7cef93f187ed08caa7da2b9d7bfe484242ba010713e10b62a04855c0aa1bcbd26e3164269754fe23befef036958b40e1c9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD58a71f151c64b1055f93327dd85d8ab43
SHA1a4e64656256fb4fc1f3434cec573548ae76a96a3
SHA25668f92b370035e2151abe586ee67fed35e45e034d0d222154640eac40ad71df49
SHA512246eb3fff5535ad8b451e714e24dd68b8cc929aaffc36da24a000d8b606fbd8e025b9eee507a96d8569a3b40be699915d74e437e8065b3c2a2d99c99008f2f81
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f24f.TMP
Filesize48B
MD5601806d3e7b8dcc89024b85be2943461
SHA1226e070d967e03b83aff83db635d1ad6ba05f9b9
SHA256a0489372ab5e36bd9e6f72596c8572f39f6011cd846821ca7a3ea02c46b98a81
SHA51234ecb265beda1a3ea920caab05a29bca7dfc6b4c58776ff0625a3bd17abaac8935ab77b06d94fb56f0041bd46366787ba4cfd641c0c9a0333c83ef1e39f2db87
-
Filesize
136KB
MD5a642f735e8434b360a977c7f06a9ec15
SHA133645cd8a0851bba6d10b287d60427228ef505e8
SHA256002ae679bfa05df7150f3f95eaacb9965670506957edf48522d90d22d84d933e
SHA512af28d7a97da296d3162bb953bd46f1df9b903e7fc094159781e0cb452fb79a8569a34e8f99d01d68252b89f651418e8b1ed4a3d1b18d9f076bcdc9853dfbd552
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd