Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 19:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://h-citibank.online-metrix.net
Resource
win10v2004-20240426-en
General
-
Target
http://h-citibank.online-metrix.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609653749624526" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3756 chrome.exe 3756 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe Token: SeShutdownPrivilege 3756 chrome.exe Token: SeCreatePagefilePrivilege 3756 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe 3756 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3756 wrote to memory of 4736 3756 chrome.exe 83 PID 3756 wrote to memory of 4736 3756 chrome.exe 83 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 1904 3756 chrome.exe 84 PID 3756 wrote to memory of 3060 3756 chrome.exe 85 PID 3756 wrote to memory of 3060 3756 chrome.exe 85 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86 PID 3756 wrote to memory of 2664 3756 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://h-citibank.online-metrix.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9f4bab58,0x7ffd9f4bab68,0x7ffd9f4bab782⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1868,i,302830033664590657,3046310251964131918,131072 /prefetch:22⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1868,i,302830033664590657,3046310251964131918,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1868,i,302830033664590657,3046310251964131918,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1868,i,302830033664590657,3046310251964131918,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1868,i,302830033664590657,3046310251964131918,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1868,i,302830033664590657,3046310251964131918,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1868,i,302830033664590657,3046310251964131918,131072 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4912 --field-trial-handle=1868,i,302830033664590657,3046310251964131918,131072 /prefetch:12⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3384 --field-trial-handle=1868,i,302830033664590657,3046310251964131918,131072 /prefetch:12⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4000 --field-trial-handle=1868,i,302830033664590657,3046310251964131918,131072 /prefetch:12⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5f522f10d3473cd34bcc5fd6b3d9e4d90
SHA163bf54605c4935bf37453b6344485ef1464cf531
SHA25601c84ce4367fc795922955a6acc4cc01cb5ce2315f448e932474f89646a03a69
SHA5120421db021005be5c79fe2ba740ea72185e3f21cf1b58fb0e5ba9c3a4860c0e82a1af69f431a2ad2a2182bf8f0d2451ed7e03ca8892ce2e1f4ef309b03b3b1898
-
Filesize
130KB
MD535c9d5b42c84f8dcaf5044be8ab20d6c
SHA16d2c84c3dbf23ae39af1a497549e719527a51754
SHA2566f4c1a5e807b5230c9ef8759b781fcbf797187abb01ecd13e67dfd47daefd755
SHA512afe5a7547835e4be49100e0a73134bedce0a527c4680dafb72dc96a1be71fe26895515a9de43b7cd799a8e09f980fe346b93b5442a667bd2aebe6b1bf9103127