Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 05:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s2.bl-1.com/h/i/dwgPbdVp/Pxj9qNV?url=https:**Ajetstarairways.sharepoint.com*sites*jenjst-safety*SitePages*Flu-Vaccination-Program-and-Winter-Wellness.aspx*web=1
Resource
win10v2004-20240426-en
General
-
Target
https://s2.bl-1.com/h/i/dwgPbdVp/Pxj9qNV?url=https:**Ajetstarairways.sharepoint.com*sites*jenjst-safety*SitePages*Flu-Vaccination-Program-and-Winter-Wellness.aspx*web=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133597941725590659" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4716 chrome.exe 4716 chrome.exe 1976 chrome.exe 1976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 556 4716 chrome.exe 84 PID 4716 wrote to memory of 556 4716 chrome.exe 84 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 336 4716 chrome.exe 85 PID 4716 wrote to memory of 4760 4716 chrome.exe 86 PID 4716 wrote to memory of 4760 4716 chrome.exe 86 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87 PID 4716 wrote to memory of 4804 4716 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://s2.bl-1.com/h/i/dwgPbdVp/Pxj9qNV?url=https:**Ajetstarairways.sharepoint.com*sites*jenjst-safety*SitePages*Flu-Vaccination-Program-and-Winter-Wellness.aspx*web=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffc27ab58,0x7ffffc27ab68,0x7ffffc27ab782⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=2040,i,18173505634682748922,8908305418767423048,131072 /prefetch:22⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1940 --field-trial-handle=2040,i,18173505634682748922,8908305418767423048,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2184 --field-trial-handle=2040,i,18173505634682748922,8908305418767423048,131072 /prefetch:82⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=2040,i,18173505634682748922,8908305418767423048,131072 /prefetch:12⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=2040,i,18173505634682748922,8908305418767423048,131072 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=2040,i,18173505634682748922,8908305418767423048,131072 /prefetch:12⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=2040,i,18173505634682748922,8908305418767423048,131072 /prefetch:82⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=2040,i,18173505634682748922,8908305418767423048,131072 /prefetch:82⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=2040,i,18173505634682748922,8908305418767423048,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5600a1a134b79ed9a4caf33fc9d6690b2
SHA1dc02623a55f2ffe56516f48f05211eee3166096b
SHA2567bfe7874efd051cf989f863643cfb60ab812b27813985d68899861d6b39a2e2a
SHA512e667d477be1a93e61ce873a28038b4a60ac671d53b809fc344a8e29c2ee48dedb12799e213f0973fd039bb10fb4b74031faef94431d3fd2c6dae8999d2c775ed
-
Filesize
2KB
MD55513a44582fe997d00b834258dc2e14f
SHA11d5a1e61ab37c97ec8c4b2767e5d77d37652f94b
SHA2560e3fa87d4d5ce2d82da29ef88c6af82dfd3084392f5cb33b885e9fd3e1421dfe
SHA512beb467ba2c123b67fbe62d486b4a4937e79e1452437546cbb8a6bacabf5b0c89f61d89c5e95d223d8d7574f8d7647493e5497865dc66e59aeeee340671ac09cf
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD59d3d779a2b03ca5e5cb714e0a5142e5c
SHA17ea1abaf40691977b85c93ed61481443237f9f83
SHA256cbd58cdbb3562b8be71eaada3345777b47331dc96dbee7b71e86df34defe3284
SHA512073cf130dbeee608182d9e642abc727cca2d8cf138239feeda94c00649f1c0c300b7909c746c799d358b5a16e02d1e755de865a0b265f55239a0251a62111218
-
Filesize
1KB
MD5fc695e919bdac149f1e12b56e076c432
SHA113fabf00b3678a8d338b81f1ae1216617f1b1f98
SHA2563442956b0a3295362d292236b510f1e069325800d730588bd7978257c348d63f
SHA512f00b45c862e264218f5b3bed2f0b0744910a1e0c0affdf6a6af0988b77812fd89d47df18b288e8662fb6794eaa26cad3add5829e1e06d119bf5297d669ad6ce6
-
Filesize
7KB
MD5696d8472e3ae95fea8a887dff5b44514
SHA126cab5579668eb69c92421e9c0cd9f8e8c2f8348
SHA256433fbff75f3230dead9849a39e88c16586e8fdb0ec53e1d6783fa25d4342150d
SHA512220f38100679233a2ac49b4305d4e800ae95e3ee9349794f74cb74f029fa40680e9f768f83b5a5d939101d996b106dddd78c2db1971996fa7f4c95f1b2bc4643
-
Filesize
130KB
MD515fb9bc22dbbcb9de957008f49b98c61
SHA1d2eae030a8257f8bd7cb054d7a0462d5363397db
SHA256196c715c979e30c674ac409ba76d092c97985218e8f357e79807da42e9345a13
SHA51241f332d829a4e866089aa5964aac4ffca7440fd0f60d4ea1edea9b8a514f8094830a88d5d725849243218aed57a7d213105b0f0584c25ab45f62d2ab13724ec4