Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
49s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 03:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sheyla4nish.uk/wq.PDF
Resource
win10v2004-20240419-en
General
-
Target
https://sheyla4nish.uk/wq.PDF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133588336448417238" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1312 wrote to memory of 4268 1312 chrome.exe 84 PID 1312 wrote to memory of 4268 1312 chrome.exe 84 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2292 1312 chrome.exe 85 PID 1312 wrote to memory of 2180 1312 chrome.exe 86 PID 1312 wrote to memory of 2180 1312 chrome.exe 86 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87 PID 1312 wrote to memory of 3432 1312 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sheyla4nish.uk/wq.PDF1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbde19cc40,0x7ffbde19cc4c,0x7ffbde19cc582⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2020,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2112 /prefetch:32⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4580,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4928,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3436,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=208,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4840,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4976,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4912,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5060,i,3528642776750930083,11419642090151084325,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD510202ea541ea1b9cf1a2b4489e37b4bb
SHA17cb334322cb55de387b76f3b6d5b8cca1ed397b8
SHA256ef566fd4bde791aff31789a0692691a46f0b5c22a2d12bcc43db366da002cc86
SHA51275f93e1d52838f4b3ee0b0bf5fbc1b71caf806fa82f56871aec664f167d38d9c5330e3b7cb7484f3392a331fd7e666bf203fbfe343dc71efe95094837a12cb9a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD57a2005465908d25735ca8b0d950aa88e
SHA1c682f2e6603a4b69b75f585ae8fd957e6c84a711
SHA256281a100f183afb3ce77755bfdbcb846e09779f09547e89147c9fb2b7d0bff998
SHA51254a0013dc2145436fac1f100cddc1bdf7d159458d35dd424479860494de3a3dd1e8a8147d48076531b798dc5e73808d1841a4f065be65162aabf5b844de14f55
-
Filesize
9KB
MD56891c599caa77e492186f48272f05d6b
SHA1907676a79e197535155b5f7b2aed47f009eb4117
SHA256d5880f10d7aec52e0d5a22e7170880d58ce36075f2a6cb406f5936d3f9ea19e5
SHA51207e763fce694ba6fb340d03de4ddb3ea878e31eeee0b466924ae7f72d45c78b0b2357bad8a3ab53c70f61e8a12c27f06ee625c5001f12ceaa93b0e24f36bf0d0
-
Filesize
9KB
MD51a54b624a20094178422f9dc47197ee7
SHA108aa18479fc31f00dd432dba226028a8c424d3fe
SHA25627b9f1318772fa503d55a9eae6aaf94a6cc49b339838165143bb183bf393e84c
SHA5125a8a8db86be4a821eb482d27cf55f9815f1638cbfdaac4f5a005fc83688dcb27aea9560e03343b1ad85b468b68c8f6423864c92a4cc2f411a96bb163eeeb6642
-
Filesize
77KB
MD5bca356dff97b47e2ae6daf9cb4d030d5
SHA103694becf78ede12e0a86719aebf2c2dd5544e4e
SHA256ed9ce3aed3bc12505ab0932ba3d4fa890bdc9534119171f97174e0a71ae83630
SHA51207ea97b9ba9001d531cf97f5e836a5d1405f13562fca02474cdb767dda13b97601a33996a2a293e3f69dc76af62c806253b32b40776d47cea1d8623a9a88f304
-
Filesize
77KB
MD591b0d1b63df8ed9c179dcca6e89c4b2c
SHA1bbb56218c7853cec3bc5d0f72af1a1d4a2aea866
SHA256e26bef115492549b72ae4920d06cbbd1512fbdeae075d067ee7036eda8668bf5
SHA512f43fa1b3fea3d4afec1386be7f78ea3318ad20ac5e2ec6aaad4d3bb0c005d989aa03b6bee17e55b0aad8eea5edf53d0faf47ee845b481f0cb6322ca4da9365b3