Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/05/2024, 20:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tinyurl.com/37k2dknr
Resource
win11-20240426-en
General
-
Target
http://tinyurl.com/37k2dknr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601924201088593" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2912 chrome.exe 2912 chrome.exe 1208 chrome.exe 1208 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeCreatePagefilePrivilege 2912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe 2912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3836 2912 chrome.exe 79 PID 2912 wrote to memory of 3836 2912 chrome.exe 79 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 340 2912 chrome.exe 81 PID 2912 wrote to memory of 3776 2912 chrome.exe 82 PID 2912 wrote to memory of 3776 2912 chrome.exe 82 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83 PID 2912 wrote to memory of 3216 2912 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://tinyurl.com/37k2dknr1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff427bab58,0x7fff427bab68,0x7fff427bab782⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:22⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:82⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:12⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4368 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:12⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3180 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:12⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:82⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4036 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:12⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2320 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:12⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2780 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:12⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3956 --field-trial-handle=1888,i,5803616413511383339,12408180294345933177,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b38ba179d0d1e6f2814ae964690c6397
SHA1f80b9dd7cc0fdf5c924289bfd31035e521ea5dca
SHA2567d49f7a98434170a7625f8b14ffc9db674840691906a030216bbc9fbfdd00386
SHA512881a577618e2496970a1b460c5d4c429e186a2f6a91801cdac036776917ed1f6c54ed7f4ac0472470295769c5a82592d0d27d0ec695f811951e25d04c2dc7bed
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5f181ac7dd3d7907a127e4e6f2929c26f
SHA1733461e318f444d457aa6ab7f0f9b03080523889
SHA25678a9323ba1cac3f9400d4797a14ae85d4c701883c3f724332574971de6713950
SHA512add55a1fa622cc94a730b6a635e3db9ba5ccb8358e2b10b0c6fd9e4a3331dfe51d9956d0577d500a180ef828897fc0757503fa7e31df450a1a95c752323405ab
-
Filesize
6KB
MD5fdb1d0ae653d170237cf96a1924b1206
SHA1185a63a563e85c9d27f6e1d5af73c7c8a3fbf4ec
SHA2560849fa78b5b50d7dbed5d7ab8f0258f161252898abebb11524d25e697f737f02
SHA51273a317c2d6ed2b4e2bcad03e2c707521d978e7a5763045ebe18cbe0dd22c445bceefa2967f4a557e4e9fd7130968ed027b4f1eeea47b29fb742c2ce31f10dcdf
-
Filesize
130KB
MD5ceb7a9815c862b4e401c7b76846f8655
SHA1189c2287245af04938324b92e0080da7727d7461
SHA256e3fc4f9c9183832bbe99a13d5ec4f63bfb11b15fd6ffb8e8804a610da19289da
SHA5128a65da15b0acc54c3c9ec38caf2ee187c942fda620f8f8fc0a68e38830fa0bf3bc4d9515030e38e4329b7c3652ee7678bf995fc21720f0f95412fe24a1d71c2c