Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23/04/2024, 09:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://digital.etihad.com/checkin/bp?j=44681B3D46C1F78EAD0A61B963761C31CDE3C2091713675292&t=3106533100476ADC&lang=en
Resource
win10-20240404-en
General
-
Target
https://digital.etihad.com/checkin/bp?j=44681B3D46C1F78EAD0A61B963761C31CDE3C2091713675292&t=3106533100476ADC&lang=en
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133583391745807049" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1844 chrome.exe 1844 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe Token: SeShutdownPrivilege 1844 chrome.exe Token: SeCreatePagefilePrivilege 1844 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2064 1844 chrome.exe 75 PID 1844 wrote to memory of 2064 1844 chrome.exe 75 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 4912 1844 chrome.exe 77 PID 1844 wrote to memory of 1524 1844 chrome.exe 78 PID 1844 wrote to memory of 1524 1844 chrome.exe 78 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79 PID 1844 wrote to memory of 2124 1844 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://digital.etihad.com/checkin/bp?j=44681B3D46C1F78EAD0A61B963761C31CDE3C2091713675292&t=3106533100476ADC&lang=en1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff843689758,0x7ff843689768,0x7ff8436897782⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1508 --field-trial-handle=1764,i,18195388940238749012,11332547216452572225,131072 /prefetch:22⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1764,i,18195388940238749012,11332547216452572225,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1764,i,18195388940238749012,11332547216452572225,131072 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1764,i,18195388940238749012,11332547216452572225,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2868 --field-trial-handle=1764,i,18195388940238749012,11332547216452572225,131072 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5180 --field-trial-handle=1764,i,18195388940238749012,11332547216452572225,131072 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 --field-trial-handle=1764,i,18195388940238749012,11332547216452572225,131072 /prefetch:82⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1764,i,18195388940238749012,11332547216452572225,131072 /prefetch:82⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3744 --field-trial-handle=1764,i,18195388940238749012,11332547216452572225,131072 /prefetch:12⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1488 --field-trial-handle=1764,i,18195388940238749012,11332547216452572225,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864B
MD5338b2a77b11e8207995630d59eb09800
SHA1aecca4f680bfb0553fb450ee7f0d3ebd8d67e8fd
SHA256cd82672e1f862b221b9a20f0fe6522e215cd66c176278bec4d8f5eec47ea6fde
SHA51275c72b7c1e289bacd25a2f4fdff782de995129a005a73f67476ca971503a5173ad671c215363f60bec2583b2d4f3de39b072fc4888ee9484106a372e7c344fe9
-
Filesize
5KB
MD5efcd0c000c6a169de67a000ff1939770
SHA152d22cc25f03a428dd77f22b1d88cfdde4ae05d0
SHA2567f3437c310d1db042cf63f2637172d8e1bc2c7898f9e2c99c66de8859d320dae
SHA5120e68a9bf9cd7b4c4a057b9dfb6172b31e343968ba8a2fe127a20031025b646f6d8c488a5331bfc38401e5ba69df2af528f9e7ecc037ca7b36c10a591b93233d5
-
Filesize
3KB
MD517d3fdac83cb919a2b80959a8a7e6b2b
SHA1969c6234fbb49b42c7755cb5888cd0e3a2a90916
SHA256dd656424221727a125b38a82445d3f74d58989564d62bda1268b7d14096b299a
SHA512e5e88e357f03076289c6cff0c7ffbfd515fe19816984a1d10f59d808ecefa63c226ea750e10443f911664c0f065242245e846cb0bb3889857b9ff96585f4836c
-
Filesize
3KB
MD5dd80ee99e5a60813cc1021207ab1e536
SHA163d9e1e0a3fa0319445ff1f3207c2c056bbf8325
SHA2566e221b2a0a79d3ede0cce5ceb4eb62eae08074bc635f32a6edebef24fa231419
SHA5125c28eab7f84f26783bd516c2bf6f841912113bdb2b823beb13c3b5c572af7ef4d9e702e33f113feb9eca51d60247a141f301fd9f8e552c1217c8ed73b57490d6
-
Filesize
1KB
MD55af2c3b4ee602ac7c5ae993c174ba1d4
SHA1d8f4ee06a37811a127048c9a3e5522942774415b
SHA256ce8adaf9ec03fc08b6268ad9520177de24bcadeb1d59404277e2cd31d48ee3f1
SHA512b61b828adaa61ec32509bf6f09dee4c2bf0dd718a388a345afdcb4f753513eead0b827d2fbd3e7ff313fef1b45f44fdfa1110a402890e5ad546de3bf2db9c8a0
-
Filesize
5KB
MD5444d3a62959c06e1cae2cd886de3cabd
SHA14350ced136c133164e4d8cfda22130a9987b39dd
SHA25616b823feb6fbd06daf61ba85a5162650c16199bf316875d7c28274265265226c
SHA512ed1463bc50cee10f1ac0195749de6f1bb3b1b3242564decccff48cb6c1b35c52343918aa7f395ed0043ff3fb92ce4aaca6c2f215aa7eecb5c13596e23bad5e44
-
Filesize
5KB
MD594efe9b361049461ac98d223ab81da99
SHA117c20dabc3175a019519e59731e122027c509d36
SHA2565cc297450eb5632a81b05479b9145ab5bbf318f3af0f4ac7e1bea4913f8cf38b
SHA5126c66d88e1d97d8319baba4f0c8e16d308063e4c4d12d376d6e674aed6e264927dea93a1610b2649df82df1b4992e00c72e39a47889acec53d9607eb4b5d131d5
-
Filesize
6KB
MD506ba7c2c22cbd4a161f98a421b50c086
SHA1407bab88938a6c7acb23ed5df508408a88171f78
SHA256ebd851dcfd8221d7172c233157cc450a68da0af2764d82b6a3c035d4e22e1943
SHA5120b2e42311d715c301a7506399a297b82658cb109927e5d3d9976b99077bbdf56201b05ca1c2755c8a61ebe36de4fb9d470a6d2f42a81305139592cd6a5a64cb5
-
Filesize
136KB
MD574f8e961de66515d1f091e5fd86c7f86
SHA1c5fc5af36a5f8489b112b12322ea1ae556ddf855
SHA25610ec6bc66548c01790acc4d16a25264ada1197a87e45c0964752334258e5f272
SHA512fcf27cdbcf51e156239d65b150fabca1064a494285f8be0f8768cd55e0ef67719fcc1e83c1136b0277abe3f4c8312add68dce6c7fec514ba5484f692b598f157
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd