Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
36s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/04/2024, 17:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://D2YD6S04.NA1.HUBSPOTLINKS.COM/CTC/GG+113/D2YD6S04/VWHSKP29YYC1W7MHVP89GLBCLW5YX2X95DJY0PN2VVBZ65N4LBW50KH_H6LZ3NXW3DFPNB4C_Y3MW6VLPDM5XLX8SW1B1WQK14RRJ1W5XBYX34CZWXGW2XWWHF32CTRRN3YTJS2YJ-H6W3ZQPC52VV13FW8PMDBK4NBRXNW4VLZ2D55QX3TW8_QBN539YPBRW8S_T332MGP07W2J8SBQ66YC_6W7ZRT634CRJ2WW6Y8BKN5LCGJRW5HP4WR6WTV7_W2Z0HTS4C3QQVW3VQM8M4BBD1KVG9S2G6CRM09W1XG_PM80CG0CW91GFF22VBMRCW6WP_QL6YW6N2W47NVMK7BLVVYW222XBZ7_JDJWN2JTBVX_XCQFW5TYW1Z5Y3RJBW4YGNJ36FRS6FW21LDNR4XMVH7W6V7MGC9DSPVYW3HBF4R5CSV3GVLFDJ04GRXK9N6YFW7YLKQKKW6JRSGY4KT-LRF1XPDWS04
Resource
win11-20240419-en
General
-
Target
https://D2YD6S04.NA1.HUBSPOTLINKS.COM/CTC/GG+113/D2YD6S04/VWHSKP29YYC1W7MHVP89GLBCLW5YX2X95DJY0PN2VVBZ65N4LBW50KH_H6LZ3NXW3DFPNB4C_Y3MW6VLPDM5XLX8SW1B1WQK14RRJ1W5XBYX34CZWXGW2XWWHF32CTRRN3YTJS2YJ-H6W3ZQPC52VV13FW8PMDBK4NBRXNW4VLZ2D55QX3TW8_QBN539YPBRW8S_T332MGP07W2J8SBQ66YC_6W7ZRT634CRJ2WW6Y8BKN5LCGJRW5HP4WR6WTV7_W2Z0HTS4C3QQVW3VQM8M4BBD1KVG9S2G6CRM09W1XG_PM80CG0CW91GFF22VBMRCW6WP_QL6YW6N2W47NVMK7BLVVYW222XBZ7_JDJWN2JTBVX_XCQFW5TYW1Z5Y3RJBW4YGNJ36FRS6FW21LDNR4XMVH7W6V7MGC9DSPVYW3HBF4R5CSV3GVLFDJ04GRXK9N6YFW7YLKQKKW6JRSGY4KT-LRF1XPDWS04
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133588841648055894" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1112 wrote to memory of 4980 1112 chrome.exe 80 PID 1112 wrote to memory of 4980 1112 chrome.exe 80 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 1560 1112 chrome.exe 81 PID 1112 wrote to memory of 3908 1112 chrome.exe 82 PID 1112 wrote to memory of 3908 1112 chrome.exe 82 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83 PID 1112 wrote to memory of 4304 1112 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://D2YD6S04.NA1.HUBSPOTLINKS.COM/CTC/GG+113/D2YD6S04/VWHSKP29YYC1W7MHVP89GLBCLW5YX2X95DJY0PN2VVBZ65N4LBW50KH_H6LZ3NXW3DFPNB4C_Y3MW6VLPDM5XLX8SW1B1WQK14RRJ1W5XBYX34CZWXGW2XWWHF32CTRRN3YTJS2YJ-H6W3ZQPC52VV13FW8PMDBK4NBRXNW4VLZ2D55QX3TW8_QBN539YPBRW8S_T332MGP07W2J8SBQ66YC_6W7ZRT634CRJ2WW6Y8BKN5LCGJRW5HP4WR6WTV7_W2Z0HTS4C3QQVW3VQM8M4BBD1KVG9S2G6CRM09W1XG_PM80CG0CW91GFF22VBMRCW6WP_QL6YW6N2W47NVMK7BLVVYW222XBZ7_JDJWN2JTBVX_XCQFW5TYW1Z5Y3RJBW4YGNJ36FRS6FW21LDNR4XMVH7W6V7MGC9DSPVYW3HBF4R5CSV3GVLFDJ04GRXK9N6YFW7YLKQKKW6JRSGY4KT-LRF1XPDWS041⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa341cc40,0x7fffa341cc4c,0x7fffa341cc582⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1820,i,5161384029715427468,9259588658345748481,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1816 /prefetch:22⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2084,i,5161384029715427468,9259588658345748481,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2124 /prefetch:32⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,5161384029715427468,9259588658345748481,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2336 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,5161384029715427468,9259588658345748481,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,5161384029715427468,9259588658345748481,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4480,i,5161384029715427468,9259588658345748481,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4492 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4940,i,5161384029715427468,9259588658345748481,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5076,i,5161384029715427468,9259588658345748481,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3676,i,5161384029715427468,9259588658345748481,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD56f7bb8ee6a4634decaae475ed5019f55
SHA1632d63996d317c3b0c7eb68d874be7b6f86b2ebf
SHA256a4901d7acb7a425a493efee7dc7916a713dec9038206b6b741d6c8bb2c2dbd50
SHA51236fbee0a6de56157d43f7e8301c5ed54e8b0c1bc4c62adece6449ede0274407d94c882daa8cafdb90ff77862c9c43ca8e77cfd883b0d269b3b3b250338a1201c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD51db3d822f1757db06e806cb65e425921
SHA1b3959c3a03b59bcf40f87e913c6ee1378f397ff0
SHA2563ad3abededf3c9ea27f8b1597a4f3742de84243215062c974ff363213b97008e
SHA512fe7e462c3c8b10173be7ae1639d4d5eb85bcc036b6bd9b65cf0a4c38b3b2a32aabc0a76b6f0f8b016add584d94f35776af4e2ac546d486665c118554e2515861
-
Filesize
9KB
MD5755ba56d77ffeaf9688f6667b2243d0b
SHA185e624fb859536baef5befb2404ea49a24cc54ea
SHA2566d3d0b16814199215f6838d32357f4fb63596e8c088435c63ff7704c2ff88611
SHA512aaea41600722378a45fc25be1e1231cc1e1eeceae7961841a99a0454724842f6bb84c368dcc56ffb934045529530b489aa8882a35cc439124fd564a1084ea235
-
Filesize
77KB
MD5de4860064a8216625439fcd7628b8893
SHA1a958c0489f21dfe0d5a98ca7a8c4ddef04817a26
SHA256bbfdb429c1058b6539a1d10c6aaf2adb20555a496cbc3bc12a7c51ef45ea6008
SHA512b28bcca3d2878defc3408fb2a641c6220d90cc57b0acc8aeadee178c644673f124b049d323b325fd8b870728d8595b2befea3db17b589aeb69ac3b6cd0634e3d