Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1200s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 09:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://partner-hub.deliveroo.com/welcome/b5435d630b65d3bd0532b7c77337b1c8
Resource
win10v2004-20240426-en
General
-
Target
https://partner-hub.deliveroo.com/welcome/b5435d630b65d3bd0532b7c77337b1c8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133623975148659171" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3400 wrote to memory of 5080 3400 chrome.exe 82 PID 3400 wrote to memory of 5080 3400 chrome.exe 82 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 3964 3400 chrome.exe 86 PID 3400 wrote to memory of 5064 3400 chrome.exe 87 PID 3400 wrote to memory of 5064 3400 chrome.exe 87 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88 PID 3400 wrote to memory of 3656 3400 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://partner-hub.deliveroo.com/welcome/b5435d630b65d3bd0532b7c77337b1c81⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadc09ab58,0x7ffadc09ab68,0x7ffadc09ab782⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1904,i,13513029371045191731,9800949455782421451,131072 /prefetch:22⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1904,i,13513029371045191731,9800949455782421451,131072 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1904,i,13513029371045191731,9800949455782421451,131072 /prefetch:82⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1904,i,13513029371045191731,9800949455782421451,131072 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1904,i,13513029371045191731,9800949455782421451,131072 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4084 --field-trial-handle=1904,i,13513029371045191731,9800949455782421451,131072 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1904,i,13513029371045191731,9800949455782421451,131072 /prefetch:82⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 --field-trial-handle=1904,i,13513029371045191731,9800949455782421451,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD5bc130b334d69fe1a1fec65f4b3011528
SHA16d2cc48b0fc81defbb5a7436fcbc83ea22a5b846
SHA25627d4155ac68cdf79f1caf41144fd8da58d2808d930d228f0f444e2cb870bf634
SHA512f0af6ec5d7b33e64a4ad0cebde4ce96299a73fbaf13d12a4b2abe08bc20122c7f660c867e098d29b7f630cf49f859e8115e14f8e1156c607e13dcc7802302ed3
-
Filesize
3KB
MD520f34654ef893e1e2b46b7d6ac91d25e
SHA10c12efe3fb3600503425e79f60f225697a5935f9
SHA25637662f4b8654ebf32b7f4ba877c40db362864a7fba20fe4bdf6c0f67ac0d8fc9
SHA51216964a66e4907d3ea955f72a063b9f2c87f2fa4369de551e67d367e0a9b2e994c3abfe4bbed56183f52f0137373897597518367b8246c25afe9b4f1290d63ea3
-
Filesize
4KB
MD56a5719da754a552bae3675ab6a85756c
SHA1a938df503d27364e7a8fab9c1d3b3933b5c6190a
SHA25685e7a856542807e4cdfe9aa28d380333af8424cfc9d69acc863939ce24ab299c
SHA512359b9668b4d0c413d81449fa4009b8f6ebe1ffb74a55c2a144e48cff1df8ee169a5025352536cf27f180d671e9c522e2cb2b1dcd8cb66181c0e1253f7dca3d0a
-
Filesize
4KB
MD59a4826a58f363b3faf414d0f64d67adc
SHA1defa93b42d59a9c98a9effd41cf86c5c8e1ef29f
SHA256e15947696a9cd2be353e11d261f2567bbe5bee1f02c74e4a1e3a4b432fccc239
SHA51211124512028c67f8920d0baafd4228d717b0db95df8d37336b7c8b3a0a552395b4cc2c36f2318ba7955dce108cf860a03ba1c057a706e4288603aa3e310fd0d9
-
Filesize
3KB
MD5b13649198fb10b9a0100c5a8b49554bd
SHA112edb9d251ab64c329f16cc7bad8f648f78bad28
SHA25680e56a335f158fb05f07674aab06a998536b284a7352280b493f151c9ace4701
SHA5120fa47210676eec2c50910a8a9319e0fe8bbc8b91426476ea09174f44af9b5dd0079dce3412786bd1a32e5ab86b93a55748eab6b2fc32cafbc5ecddb2c4d2903d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD59d26347131ac2fa89df1858697e958cf
SHA1a0b04108f3ac4267a2ca79f42b8fcf42489e4373
SHA256a817d9c04205cbc244e83e7f88973d308066a52799715b63dc6c189345056d61
SHA512922461cd51e379f50032f22feb60537d0c0cac6dbddd10b9192289e51bdf413dafd632dc177f19d31e7fbc70e02a202ce55436539519f4ee93e838173f020885
-
Filesize
1KB
MD5ce2bd2bb746495f5e4e651778317bbad
SHA1445aded38a2e16490539b73ec11ce87245b180d0
SHA2560fddb301fffce09ddf45cc2907e1535c1af2d61b4cf1d46972fbff5fc2e20a21
SHA5123dfda742b3763188ed98c0c39f8fd5051fc880708e29290f33d92875a5ce580cc5e68649dfbfc4dffd8ffb776ab6b1efef4c624f2073d8da0aede713bd6ce5ab
-
Filesize
7KB
MD53b08449843faf3d564ddfa3f0c406ef5
SHA13b204f41a4641857cbd04bffe731866e61055d4f
SHA25662e08fef5e68115e033d3a3177cffa239e9b9f61d699099cacbea80b9e31bb18
SHA512e2837bc5e16ee584e6c3da27a0fc8d5f0c11f1f6aa96fecea7d5fb52220d32ecf87652db8e8364c50f9d555494885e75291faea99e19e0f1383d11e221750645
-
Filesize
130KB
MD512f5cbd951b5348239989b445cd7616a
SHA143985478a98540517f392a90fc847250a8e951a3
SHA256beecd172f4e826efc56d3e61af84e3fdf217284bef622aa232ea9b5127afb0c6
SHA5121974cb9b86ab48bc3e80ca6b412e7ec7fb8c83ddb65f49c6648401f73191066d53316c1228b86a86306992736a6e709887b4d498fed583502ab89a2d62576d8b