Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 10:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://yopmail.com
Resource
win10v2004-20240419-en
General
-
Target
http://yopmail.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133590328721031710" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 2748 4888 chrome.exe 83 PID 4888 wrote to memory of 2748 4888 chrome.exe 83 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 1924 4888 chrome.exe 84 PID 4888 wrote to memory of 2628 4888 chrome.exe 85 PID 4888 wrote to memory of 2628 4888 chrome.exe 85 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86 PID 4888 wrote to memory of 4776 4888 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://yopmail.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff91783cc40,0x7ff91783cc4c,0x7ff91783cc582⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2128,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2124 /prefetch:32⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3036,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3048,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4568,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4576 /prefetch:82⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=5052,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3264,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=1524,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3316,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3288,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3308,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3356,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3800,i,15753679776905270829,9366170489042094101,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c0f2e7eeb9ebeecae129935297ecb8c9
SHA10c3367b7f6ca33d0036b48e18136693e41badc75
SHA256d0565e345177f83281a6207dc49003662f3326dfa439e3112c262dc5d115153e
SHA512441d8bd7c274b6dc8fe45ea3a7645f49057b77b02b4bba34961e2308db6298ff14cad59ba17ce5dbd308043a6b90c5c1215d2dde5ba529adecc3225af754e2f0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD510872639b738a01065ada8babc50f5ea
SHA15c2dec582094efbe6b3735f049acaf9722b9dbd9
SHA2568bfb99384cb0e14960249cf6ee4563a55d8c8fcc85a6198d19ebf705ba03f63a
SHA512f42cb91e5c5af5a257282670ea8bbb63f11a7aa52b63e86c999823364f775fefa1229ebd9a134cf3b0e52f55271f54219c5fa09f45e00eb3000370dde621c3c6
-
Filesize
9KB
MD5352a30d311085e3a055bf3047b09465a
SHA1af91e30d485ffa6df722b8f5d43b027c541e9e54
SHA256d9a479ea38b59986b0ea875ce45def73ef1689eee29119d3b26b51779af59432
SHA512f39a45a916739db102fc940ca6e93bd25b65ecebaa31105425c53b4a25155883109bd985e3fb809edb3f1bb21cdcbc7ab5e31ee502e2a0caa8c4780d9a173148
-
Filesize
9KB
MD51780bc8e05ccd949f52f5effa58388e5
SHA1b6f074eaadc9db1e6287be63ede7fcca758baa5a
SHA256394379a460042786a419366c804910ce36de9127aea81d3ad6aa8034d2e6bdca
SHA5121ede87b6ed174807bc1939c85aeaf660bd4a386a090ab08e300f0160fbbda07552c7ae518d5573e80ca072be08d99155a247a994a08f069fb1ec262b1cac7cfb
-
Filesize
77KB
MD52f69a64b0e5a31b7638e9e93c6db8603
SHA176bcf8bb4d9928560ad93116089e1c20ca18ae3b
SHA25603813df9404db8aa5dd1196a6f65adfbd3507747624dd175a8a01d4b8307a61d
SHA51288ab9ae1f4474d21882023e7085fcc9c52cfb48da6e6a6ad96933ea1bf251409db8a5e25f9cf717121ae6da20c6fbaed0a6984364dacbf9dc078b6dc529d6f70
-
Filesize
77KB
MD5eea9c5eb668742890a31c10f9c751a5c
SHA1232424e00cbd60a3c938e3e2121a46bc0cccc6fa
SHA2560a610a0724be5dde36ef3be3e454f17d42639d26ca233a54fcc5742493f1322c
SHA5122f62fe284fd85377369410f59146bfbc7b50bc8820abad9ecf856ee38b56e2020e4df59f23a92bc9e7a312b56c694c8e4193e360e12df5e4fb17697ec6659697