Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
email-html-1.html
Resource
win10v2004-20240426-en
General
-
Target
email-html-1.html
-
Size
6KB
-
MD5
8b7a4dbccf8c3ee631035364533fa73e
-
SHA1
f19b4823eb1228c7ea96e8dd6ca6685b2c23c376
-
SHA256
a3ef709dcbedcac6ad526473d6f30d0a1c614969cf3040871b134a790565d3ef
-
SHA512
9381f5cf713fdbecaee4e9683ae47db63f815cad49b2fb7e3a238da6b003da21ca9db84933aed14e639e152b0aa6ed2d99baada5d983b8cb9434b27b21d5e061
-
SSDEEP
96:rQVUBuuhAwAVMZoZtLwuc7/RvKpxJ653VXI+eszyKpP35JFJWGn9jGK/1:/AMAVMZoZtLe/Rs85FFbnzH9jGK/1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609501271007417" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 4876 chrome.exe 4876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 436 chrome.exe 436 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe Token: SeShutdownPrivilege 436 chrome.exe Token: SeCreatePagefilePrivilege 436 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe 436 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 4068 436 chrome.exe 84 PID 436 wrote to memory of 4068 436 chrome.exe 84 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3396 436 chrome.exe 85 PID 436 wrote to memory of 3620 436 chrome.exe 86 PID 436 wrote to memory of 3620 436 chrome.exe 86 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87 PID 436 wrote to memory of 2792 436 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-1.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1b97ab58,0x7fff1b97ab68,0x7fff1b97ab782⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:22⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:82⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:12⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:12⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4440 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4448 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:82⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:82⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=976 --field-trial-handle=1828,i,15575148451199806572,1444631839635251374,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b781d56f393ea5f749e0cd28431c089b
SHA1212028fd2628d38a286676aae39de3515d9bc57d
SHA256ee823ead4d1a48fc7e29abbae4bf179da8e442c55da529fb67882783833f1919
SHA512d2fe1e3e67529cbf7409a06a3646e5f2f78b824f748e4882d4488fc2ebd257ea75ca075cb158d0f23447347337f162fc8dee5d60c855d6d9432be6344f2b8d3b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5882be23c1f836110e3e727251aa74aff
SHA131c316fe41b69138a8da829915ce81afd140f968
SHA2562f13dd45a2fcf4818a088b31748fadb984a843c11849527287b81505ff14cfa7
SHA512d16c578f65663ebc846bfedfe6427bccb36fc89012f5073249f874b2d93b31d162e6627f6b4be3a2cba36f120d60ebe3ee010358c945e4d6835d5f3d2f29bd02
-
Filesize
132KB
MD5e0ff35b52e0b9587cd78fb0f1c8a20cc
SHA15b5ffd91ea37ebba6416624bac036733014c11ba
SHA256a51180613f05694766b7491497256be812d924af39dc52193edd5235090409ff
SHA51216c6edfb6c641963e7721fd922673ed739fcb69293dc3e9f62bc511ebd4deedf882ac1bad1a18dcd3368c556eddbe126027cc688a7a85e2dc59aae5c9b73b2c5
-
Filesize
131KB
MD51774ee9cbb84496f08d6baf63557fec8
SHA1fecab5e9e05a76db9855ebf51dff96ab98589414
SHA2560ea6045432b0deaf7672fa99883375cc299b6202254697f3d17d027ba8dd4a78
SHA5127856abf7d73d23df35af32eb3ddd943ac735362b79046aec2998a8b46709f13fe0d17d48fa47d1e9b7294b0d55490daa1a732dd3f3843358975741b2c522c496
-
Filesize
152KB
MD55ed076072bf7956f633de41052db6f6e
SHA18b2d909503b0356d23eae0fb166121175795a381
SHA256c1f45614c42d368dbf50441a2b48fac4c6fd69cd7c2f3d14693c8394c6c652a1
SHA5122237e0f065d9e4e237f880dadb99c50431aaf0210bc6067615db075136fccb13a933d3196a277fa69201621fcdc87230980eb0075d00ba5baff187fa0ae26b34
-
Filesize
131KB
MD53a382673df32115afde2d96aa8578c52
SHA152eb9037922bd3dd2342533bc60b240c31bac44a
SHA2563f2b78d5fc20763ecf10ac8dbe3d390c40e8c804d75536087a98f963ea6a617c
SHA51200af9d57289f9e4b6df7b654e3f0b554b24cf8ab661cfdc0d2bc23483e2e9ed3daaf7174fdfc5149ccf3065e975c85c66328c419b8d875a670f2d5b6ee12b5a6
-
Filesize
91KB
MD59c921720ddfc2b5ce6de55703a2fb29c
SHA19961a214e9be615a73a6adf20db3f3990f2d27d2
SHA256018a2c4cd18d30dc1ef95e6368eafa62cea7325f4a116ec682a4c6b837f35598
SHA512ad6813b5725bc9a3644b0dda07350f5ca1d3a7af3c4bf53f6273683deaeae54621659e6dca157655554a3f95c31ae01f04d9b7eea93056b13735161c5853950a
-
Filesize
88KB
MD5855d6c83adce4340936a0292ecb2759a
SHA13be4739e4e5a6afff3d70bc6074fa4d2b11d90bb
SHA256aa46cf49307cef20a487fcb93b7dba08d41d88751bf605c7b4bea15d14d52e32
SHA512f1fb5390ad586ba2dbfa90613edaf9aac9029fb322816b7a498bd7c6d6ae2beba27baec1ad63de9969539b41e436f4980e1e393da5c859b075f5b9df75a8aa73