Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29/05/2024, 09:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u44471454.ct.sendgrid.net/wf/open?upn=u001.wZgKOtjAspXT28742HUDq2rGCqzkobmIDI-2BcKcnzdYmRxcyKuP5YBatnLL7u9WhW39-2BWCFw6UAIpooUKAWal09qpvalVWIxNrqJWGKNhO7tQysT47b5lk-2FY7Fnkef-2BQqDNjp7GBBhkAN9CG6nnkY-2FHchcibjC8sEd38k9dtYnr-2BGwheQia1vrzEeCttIeAFOWQhNzvvrrzmf7ixgC8aaZI2R53U7lVt7Uv9g5E0S6-2B0mdXkXHrXyO7ueqksHaSJbvfB0qQNQ3V9Atem89aHdyX-2Fr9oRPlFAkxA1xxniTQLq30mG9GnhBpD6UD4x8u1MIfbuENO2PCWZLS74rrLqXRZSxKtWCUWXS-2BN-2BP7YdgLNmQsRuP0GeXtHVjeeH3apiBea6V8fReYYCwfymkbPQrq-2F7T4ONYx3-2BvQS1-2FUkkDWHnOFzzNVkIKvo0E6NAygbyf7YaJBvUfLCqkgCP7iXQ79JERqVlev47XsKTSFhOUhjp88wChjJluOGCRrn6nLfRNRowJNLz6rFEVFHK14GKdHr2PLq7Fti-2Bugxhzi8jMyi1jidcnwnKX3LXct6hhoJtRdOHPNtnhjyG5ESnFBIn3tmwwgsAB9H8lzT8uziSebXXvyuOma-2F-2FjWItCYKD9CHbOdkyR8caAra19hDez4jw2TTpF6atxY727fsu-2BLavYjdsuBsQYGmp79FjhueuG61KmFAxicH2geWgQp0EOCnVyLuxtUm08YWBcNS4cr8V2Pkll2mgbLKdHxCSdPuAoxb1EH7BD7-2FDKKDm1SYMO7TZsJCsufBe3da4IaCXPrJz68IUltpUwYx0bVAlQAQlAaf-2BmnIwSSFtySEOaeXnGVWPJQkJdgJBILNEb9ax9vb772oZ2Z0SQDuJqjsovBO7zI28FcgbkVe4dXcEWER0NijsrjM3F-2FI-2FR-2FmoIijcqGSqIMIA-3D
Resource
win10-20240404-en
General
-
Target
https://u44471454.ct.sendgrid.net/wf/open?upn=u001.wZgKOtjAspXT28742HUDq2rGCqzkobmIDI-2BcKcnzdYmRxcyKuP5YBatnLL7u9WhW39-2BWCFw6UAIpooUKAWal09qpvalVWIxNrqJWGKNhO7tQysT47b5lk-2FY7Fnkef-2BQqDNjp7GBBhkAN9CG6nnkY-2FHchcibjC8sEd38k9dtYnr-2BGwheQia1vrzEeCttIeAFOWQhNzvvrrzmf7ixgC8aaZI2R53U7lVt7Uv9g5E0S6-2B0mdXkXHrXyO7ueqksHaSJbvfB0qQNQ3V9Atem89aHdyX-2Fr9oRPlFAkxA1xxniTQLq30mG9GnhBpD6UD4x8u1MIfbuENO2PCWZLS74rrLqXRZSxKtWCUWXS-2BN-2BP7YdgLNmQsRuP0GeXtHVjeeH3apiBea6V8fReYYCwfymkbPQrq-2F7T4ONYx3-2BvQS1-2FUkkDWHnOFzzNVkIKvo0E6NAygbyf7YaJBvUfLCqkgCP7iXQ79JERqVlev47XsKTSFhOUhjp88wChjJluOGCRrn6nLfRNRowJNLz6rFEVFHK14GKdHr2PLq7Fti-2Bugxhzi8jMyi1jidcnwnKX3LXct6hhoJtRdOHPNtnhjyG5ESnFBIn3tmwwgsAB9H8lzT8uziSebXXvyuOma-2F-2FjWItCYKD9CHbOdkyR8caAra19hDez4jw2TTpF6atxY727fsu-2BLavYjdsuBsQYGmp79FjhueuG61KmFAxicH2geWgQp0EOCnVyLuxtUm08YWBcNS4cr8V2Pkll2mgbLKdHxCSdPuAoxb1EH7BD7-2FDKKDm1SYMO7TZsJCsufBe3da4IaCXPrJz68IUltpUwYx0bVAlQAQlAaf-2BmnIwSSFtySEOaeXnGVWPJQkJdgJBILNEb9ax9vb772oZ2Z0SQDuJqjsovBO7zI28FcgbkVe4dXcEWER0NijsrjM3F-2FI-2FR-2FmoIijcqGSqIMIA-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133614494776314519" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 2580 3380 chrome.exe 74 PID 3380 wrote to memory of 2580 3380 chrome.exe 74 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 3024 3380 chrome.exe 76 PID 3380 wrote to memory of 2920 3380 chrome.exe 77 PID 3380 wrote to memory of 2920 3380 chrome.exe 77 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78 PID 3380 wrote to memory of 216 3380 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://u44471454.ct.sendgrid.net/wf/open?upn=u001.wZgKOtjAspXT28742HUDq2rGCqzkobmIDI-2BcKcnzdYmRxcyKuP5YBatnLL7u9WhW39-2BWCFw6UAIpooUKAWal09qpvalVWIxNrqJWGKNhO7tQysT47b5lk-2FY7Fnkef-2BQqDNjp7GBBhkAN9CG6nnkY-2FHchcibjC8sEd38k9dtYnr-2BGwheQia1vrzEeCttIeAFOWQhNzvvrrzmf7ixgC8aaZI2R53U7lVt7Uv9g5E0S6-2B0mdXkXHrXyO7ueqksHaSJbvfB0qQNQ3V9Atem89aHdyX-2Fr9oRPlFAkxA1xxniTQLq30mG9GnhBpD6UD4x8u1MIfbuENO2PCWZLS74rrLqXRZSxKtWCUWXS-2BN-2BP7YdgLNmQsRuP0GeXtHVjeeH3apiBea6V8fReYYCwfymkbPQrq-2F7T4ONYx3-2BvQS1-2FUkkDWHnOFzzNVkIKvo0E6NAygbyf7YaJBvUfLCqkgCP7iXQ79JERqVlev47XsKTSFhOUhjp88wChjJluOGCRrn6nLfRNRowJNLz6rFEVFHK14GKdHr2PLq7Fti-2Bugxhzi8jMyi1jidcnwnKX3LXct6hhoJtRdOHPNtnhjyG5ESnFBIn3tmwwgsAB9H8lzT8uziSebXXvyuOma-2F-2FjWItCYKD9CHbOdkyR8caAra19hDez4jw2TTpF6atxY727fsu-2BLavYjdsuBsQYGmp79FjhueuG61KmFAxicH2geWgQp0EOCnVyLuxtUm08YWBcNS4cr8V2Pkll2mgbLKdHxCSdPuAoxb1EH7BD7-2FDKKDm1SYMO7TZsJCsufBe3da4IaCXPrJz68IUltpUwYx0bVAlQAQlAaf-2BmnIwSSFtySEOaeXnGVWPJQkJdgJBILNEb9ax9vb772oZ2Z0SQDuJqjsovBO7zI28FcgbkVe4dXcEWER0NijsrjM3F-2FI-2FR-2FmoIijcqGSqIMIA-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff887b89758,0x7ff887b89768,0x7ff887b897782⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1836,i,17111463375710682561,756570357807869026,131072 /prefetch:22⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1836,i,17111463375710682561,756570357807869026,131072 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1836,i,17111463375710682561,756570357807869026,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1836,i,17111463375710682561,756570357807869026,131072 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1836,i,17111463375710682561,756570357807869026,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1836,i,17111463375710682561,756570357807869026,131072 /prefetch:82⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1836,i,17111463375710682561,756570357807869026,131072 /prefetch:82⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484B
MD57c27b82ac998a36cdf40bf521c003538
SHA17f8f09991c391b7adaaaa1420afd7a7cc4e18432
SHA256882ad5a6c5789c352066089cdbd365e2ea94e879aed9f8302962a1048c1890d4
SHA51296cee87f01063b65ef5a299cfc40f0459aca5b523cb116d3b90cb2ff3bbf3c842cddab04d5bf469a1259370e136fc0910d5ec8e452ab306c8b114ea26957b22a
-
Filesize
6KB
MD54c2c411a0a4a51af9797ba51e8713d9f
SHA1513f9815668846fc54265aa34c3d7c8c9b2d7a30
SHA2566ea2d47385d6cf9e34bf220ae50de4458db722199bd67a6d7063c27da291538b
SHA51225a986326736dc73ba52715b3b8a193598d81a7a47ee439aa53adbe913ad8c56c5bfd42bea90788e539a0712310e81e94a4b627a77ffd616b26fb3c6bd801674
-
Filesize
136KB
MD5891756c2d870475513126bd423e2c12c
SHA106c5e1c146fc516b73fedd4af3bded9676566cf3
SHA25623737abd258433a27adcc3966eadee6f5a301231465138f9d113d280b10efb50
SHA512039c615c1c90e1aa522610fbb9473e41686110c234ceb5213e7541fdea19fdbddb8b98fe169a18a9d1142dc1ef652b0557d33054ac682e874f4e86a94073d219
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd