Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 18:36
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://WWW.FACEBOOK.COM/ECHO3DINC/?UTM_CAMPAIGN=WEBSITE&UTM_MEDIUM=EMAIL&UTM_SOURCE=SENDGRID.COM
Resource
win10v2004-20240508-en
General
-
Target
https://WWW.FACEBOOK.COM/ECHO3DINC/?UTM_CAMPAIGN=WEBSITE&UTM_MEDIUM=EMAIL&UTM_SOURCE=SENDGRID.COM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600990112593961" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4584 wrote to memory of 1756 4584 chrome.exe 89 PID 4584 wrote to memory of 1756 4584 chrome.exe 89 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 388 4584 chrome.exe 92 PID 4584 wrote to memory of 4108 4584 chrome.exe 93 PID 4584 wrote to memory of 4108 4584 chrome.exe 93 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94 PID 4584 wrote to memory of 3904 4584 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://WWW.FACEBOOK.COM/ECHO3DINC/?UTM_CAMPAIGN=WEBSITE&UTM_MEDIUM=EMAIL&UTM_SOURCE=SENDGRID.COM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb251ab58,0x7ffdb251ab68,0x7ffdb251ab782⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1908,i,14632740676445371943,13562914280555218928,131072 /prefetch:22⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1908,i,14632740676445371943,13562914280555218928,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1908,i,14632740676445371943,13562914280555218928,131072 /prefetch:82⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1908,i,14632740676445371943,13562914280555218928,131072 /prefetch:12⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1908,i,14632740676445371943,13562914280555218928,131072 /prefetch:12⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4224 --field-trial-handle=1908,i,14632740676445371943,13562914280555218928,131072 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1908,i,14632740676445371943,13562914280555218928,131072 /prefetch:82⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1908,i,14632740676445371943,13562914280555218928,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4612,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=4440 /prefetch:81⤵PID:3848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
792B
MD55a5201b1badd537435fa3d6676e8f1a1
SHA1aed34e91222b6ed977f8cba59519f6d0d9a4a026
SHA256ae7ffa40b2f29d77da89eefe3b295a2f0f4e84d17a884ec9207a5b968a4c32aa
SHA51240bb0054a39da57e19b09f4c11cfb54da668e14637a8516efd8a4f30312d43bd07a3510dc9d8cbe1e19126ce11712c964c56b592ae9ed3642a5a35bda47de696
-
Filesize
1KB
MD577bbd4b2c2e6ec391bf826610921ca80
SHA173b40ff034c826c2a27e6fffe9b2b1ae63c7cf5b
SHA256eb9960dc0a1662b0b54afa1fef261f3d5ebe073823fd9c843febbefba139724d
SHA512fc444ffa6dc603dc80fb73a442fc6269d98356198bb145fc8ce5f582f289a68596d35bbb996292aa8d95e3efc178c41a493f6eda6cbdc339b4eee38810b15b6c
-
Filesize
4KB
MD5a705f2488d3066a8b477a20511a4d9ea
SHA1c259770117f02fee96c6183fc34f98bb44bff127
SHA256b0c1175f85b4f18d33ced36005dc60d6dc512445c6db0dd2fe1af4be87c0daf3
SHA5128bc3cef5843ff55a27cb379d8924f7b1f2c4d7688cb091e1284a44ab1f4af98a339454ccd4f884df8f0b66c2a7540db9c943c44c02ace0461bce1df73c5c91d8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5819ce77cf72c8bc31a7a7aa6bcc88c09
SHA12c9c5ab4eff275b9c964ed84a2a2261522f70b88
SHA256efbd4eb529ea968453065f904a61235fbda18afd3fd5599dccfa5627d2148b34
SHA512195ea0be97da27a64ca088d57a6147861a92d0f4cc76e9ab0c73953f16012e32f9f211fe725f51fc2f6879554d930cbd3a57eb04d23889aca3a8939304166ec5
-
Filesize
524B
MD56667b5459f6e911ce0432f20bae9d8ea
SHA18a35bfd2748e47fbcf2da51dac804412523349d4
SHA25635d05ad0fd47cddd8abf4b031b7f2e2d96da336bae45bb167ee8c245778f9fe0
SHA5124b13ce0e5e874a4811a416c0e677a3dad38af84e54dfc010c03895404ab6ac8c94afe9a6d80b9b08227fccada1926fb28be742924c515ad44f5d6eedf268aa2f
-
Filesize
524B
MD599ea01b99d068386b530c819fa3250c0
SHA180a5dbd559b499fbf3356261702e37b0de51f96a
SHA25625b56794d1eaafab14b24ab4b795a5ba075fa3d9e3475b094ea436a1216cb9a7
SHA5129597ccbef71a9b59c290698cd87617b6686c31caf42d9dc17d563758407c736d592538261a87ebc03297726f397cbbc852972450ab75b8b07e4c1b493296f619
-
Filesize
524B
MD521282e795ec00d2d3f7fde9eae8eaad3
SHA14b2081ee1c892a6d254aeab50d3ce5281ea16f89
SHA256b0e4ac637bc5a55ae5984b1b73344fe2beddf133c3e63663ea89cf482ebfa32d
SHA512ae91398bd83f8083860417b4bcde2e6f2476dd5e16f5f60a22df16b44ec0aa103612bc1a74be3c33ae877764ff6775211c7f3dba19c6ace9f57ddea941d6aa2d
-
Filesize
524B
MD5df0d580fcf0be2021b3f171fcbcf95ab
SHA16aa1f19cabe9e9c281aa6225a503ad42eee4805c
SHA25652d6a76c9cdc9f90ef9be7fcac81e64bb75d1ce09ddffca24b289b71e08cfe40
SHA512fd9a9b82e366b79d5a5117192cfef5700ef00a89632946d786686e66620119e79dd313d403bf163d28338dee5793fed0009f56a014454d291a2cba6795acbe7b
-
Filesize
7KB
MD542421df7596c82a05705986e36e6abc1
SHA1130c894c6b580b01096d7b0a6bfa4842a11e5efd
SHA25609abea921148a7bb4227dabd6ac79daaef7c2eae374116f20f07ec18914cdd5d
SHA512a6c1b7ed59621b8bdef81f76a092f695ee7d4612f218a3feb4156c257eb70ae3bdbf505edbd807372f2c921c47d03dffaf7f1a8c88d210fe40fb5d1207bf454a
-
Filesize
255KB
MD5e4289419721157094ceac64943a5a771
SHA1bc24c93f0d7b9ab46e39df46d781d374a1d6fa18
SHA256fc7d619b162acf6a5ccd3d3be3355e54692154d1bb4aedd74ee37371f3797c33
SHA512189705be1dc8dca987dedf1b13887f969f010eaad33177fabbb6dfbfbdae197b3e2c1ab26edd68db637dc6842dd73aaa0852a452c7cb1fff268eca9741bd05bd