Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 12:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://business.equifax.ca/auth/welcome/a3e491e238564cbeba623e1c5285a6b4/intl_commerceb2b_can
Resource
win10v2004-20240508-en
General
-
Target
https://business.equifax.ca/auth/welcome/a3e491e238564cbeba623e1c5285a6b4/intl_commerceb2b_can
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133622364716559510" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 4840 chrome.exe 4840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4276 2148 chrome.exe 82 PID 2148 wrote to memory of 4276 2148 chrome.exe 82 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3816 2148 chrome.exe 83 PID 2148 wrote to memory of 3772 2148 chrome.exe 84 PID 2148 wrote to memory of 3772 2148 chrome.exe 84 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85 PID 2148 wrote to memory of 3240 2148 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://business.equifax.ca/auth/welcome/a3e491e238564cbeba623e1c5285a6b4/intl_commerceb2b_can1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0872ab58,0x7fff0872ab68,0x7fff0872ab782⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:22⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2064 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:82⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:82⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4544 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=744 --field-trial-handle=1936,i,9718394768907993704,11755211373106812681,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD514e975cb569b3030e621f7b76f63307d
SHA13641dbabbaf37811f8957ad41137a9e9fa81bcca
SHA256a2f2a321ed9e943d13e3eb8d1d9586dbc6539fefbf5209ee4673e972a73812f4
SHA512273bc66748dbb538096d943d45d59d99825bbc5150bb2188e036d7ed05912ff3317f7112dd481e5692f15c099a8a3c370235b9c34b705e6a1b8af77d9966e6e9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD52f1755c9ab70532238327d0003b75d52
SHA1fb9c89bc5a0e2736f20d5e4f99ba00033bbd753e
SHA2565eb43cba0b94d6841995874a1a243ca50e53bf6fd0695dcfaec353ed15285665
SHA5122030a68436f72cacf4da9419884f81db278bc8b487018bab72469cdeeda6da96007b7f2f1e924d80d6f3894a67116b3b18b8e275395f2f716b8efec183e37277
-
Filesize
281KB
MD5c6ad882b3f8fcd2c1ecdc6a25b72cc4e
SHA1f5d9919e7c1ff6eac10df48b027f9bc5e930772c
SHA256db7db8cf136d31c0d3bc602d670fd86e49f3d6c3de9ce019e30323da4150e8a7
SHA5129fa668f8e4b7836bd56b8f8a3dddac9c60ec90f8e644fdef5c40703ecd0095860194f0983d7b969e4456dc80a449927f85801e6d74dbbdb096236c586c1ac7df
-
Filesize
257KB
MD5d91fc9814c69a65ca6a2b4bcd50d6916
SHA18d8ecf770e4417a9797b9ceaee98e87f5790cbf5
SHA25652ce18366371ac104dd884d842f4afdf6bea39d2ac73a3a8c253f8f87137fa2a
SHA51277877d06b111b623c8b51e72d1516fc98391790d159217e8fcb940b8995d6c15572e0ec3e417e0eedf28888ef0b7878bf97924e3c58eb8fd4feea2458bc7f1b1
-
Filesize
257KB
MD58e9ba1605be5869aceedd62e8ba56fb1
SHA166b0b843015311485db0a736f271b8713423c296
SHA25683e7b171849967bdffcddf5ef9aa1e2949635ab4fa5a99130dab9c05a526fac8
SHA51292df2b4b669d8991b50eeaa2517289fcccd4b8e51698818c254148b01b3c5c5203caf7f435fb3a3609413aa95a9231efbf93d5dc7ba7f9644fc9549e5f43fc42
-
Filesize
257KB
MD5e6ecdda123685e485c93827e054b732a
SHA1148e5a476a93492d4cbd7846b49da4857c368641
SHA256fd569ba4cf25aa8c95b03e842096d3d05364e7e81403b9defdc6176d72582bb4
SHA512c59af9b329444f44b09199badd0cfc86edd3f2ae2273c495b14afb5232f18a641de9dd183326566f89a1234f77da1e6f12bca3bded3b436677b6558d73f989a0
-
Filesize
91KB
MD5d227050ee58262ac6e20d2291506d172
SHA123678c35487b6f4eb5942fc3c8c40f4872f6d5ec
SHA2566ed20559fefdf9afb46a9c7b0238bb322a697dcba60fbf91295eb323824ef2d6
SHA512569b0f17f21eda36e7a0abd099de78c4a00a40d1b5e6be1d2052f30073ab07dc067943c22b6bad48de717e72c52d93730d55364eff5b4a4a8fe5c5e8907cdbb7
-
Filesize
88KB
MD5fcae9e83807f63c3f4c9b0e8d3edb175
SHA108b2226c0e9f5233c63b7383432993e71f04b49a
SHA25683f2986fa716cdab8e8b99338d4e30c3f63650c620766add89fbcd903164943a
SHA5126fea492bf5c5c77ec381058c98b034015dad8698dea5bac9672f670a79af73c7dc8cfe03856398991d806e5496447764f61f9cdc84bc50ab73d3f11f0590f1e8