Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
21s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
13/06/2024, 12:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.wellnessslogan.za.com/jhdpg/LKFzIPh2RNohZHaT998teTIu8S4e89Ae8AbhYu2ZbR7DCno--GNIqbp-ptp7M5Rm.0orUBSbYVzUQhbKFrSPefhvzFbEz29PoJdkGp2T4-ag
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
http://www.wellnessslogan.za.com/jhdpg/LKFzIPh2RNohZHaT998teTIu8S4e89Ae8AbhYu2ZbR7DCno--GNIqbp-ptp7M5Rm.0orUBSbYVzUQhbKFrSPefhvzFbEz29PoJdkGp2T4-ag
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
http://www.wellnessslogan.za.com/jhdpg/LKFzIPh2RNohZHaT998teTIu8S4e89Ae8AbhYu2ZbR7DCno--GNIqbp-ptp7M5Rm.0orUBSbYVzUQhbKFrSPefhvzFbEz29PoJdkGp2T4-ag
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627554707069895" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4144 4416 chrome.exe 70 PID 4416 wrote to memory of 4144 4416 chrome.exe 70 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3952 4416 chrome.exe 72 PID 4416 wrote to memory of 3864 4416 chrome.exe 73 PID 4416 wrote to memory of 3864 4416 chrome.exe 73 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74 PID 4416 wrote to memory of 4492 4416 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.wellnessslogan.za.com/jhdpg/LKFzIPh2RNohZHaT998teTIu8S4e89Ae8AbhYu2ZbR7DCno--GNIqbp-ptp7M5Rm.0orUBSbYVzUQhbKFrSPefhvzFbEz29PoJdkGp2T4-ag1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff9b609758,0x7fff9b609768,0x7fff9b6097782⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1848,i,12381868336025747374,3142513781496745421,131072 /prefetch:22⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1848,i,12381868336025747374,3142513781496745421,131072 /prefetch:82⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1848,i,12381868336025747374,3142513781496745421,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1468 --field-trial-handle=1848,i,12381868336025747374,3142513781496745421,131072 /prefetch:12⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2784 --field-trial-handle=1848,i,12381868336025747374,3142513781496745421,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1848,i,12381868336025747374,3142513781496745421,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3732 --field-trial-handle=1848,i,12381868336025747374,3142513781496745421,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD555110cacfc591831915c8b0ebb7ca9a0
SHA1f3b184aac1e02b55ed49bc8ad4fa6648b55161a6
SHA256f0002611110a7f66f97fa510cbbfce269caed2926a75b37af841dc78fdbf16ee
SHA512de528adc2807ec2877f12fc65f0d2d1fd827a284c2cc585cdead53d06d183c18b0b01c1d2c42a9f91237558ba4f27166a3986410851c185a8003e28faeacc9d1
-
Filesize
5KB
MD5ebae91910ba9e0bb66f609718ef3b03c
SHA1d4afb61b63629bcfc1be27f3f9f33225df46a5f3
SHA25622e0ec9d6210e7709f13004b239e8330c9eb2ef10eb802cb71865e47facba14c
SHA5128528e8530f5781462edc297469c99c5d5f587186620e60bcf8ef75bfa3f10bb4a6d4dad5b50055a07794916734556b62f76b6e67a92c66bbb974c3eccaf602e1
-
Filesize
150KB
MD5bde67d501a0b567633644be7cf6b54b1
SHA1ba829389b10b83c8a6531375b1002962233c661d
SHA2569ecd9ad7a0a741b8904416a68ea0887f27898868755ea56353692f97d9441677
SHA51268d90b44e8df556b743f584e02a541323a7327bdc3695b3be629f656cd3b03077d930a3ee8a6e6057bbf0a003e33a09a5d3f2939bd3d7b2f2a2ed0f1a8623cd8
-
Filesize
150KB
MD576f65e8774b45a13e42f56b72d6f5f50
SHA1b1a12e186f4239753a456df562cfb5d2fa45d0b5
SHA2566b5858ed75a61667a8d5f420acbbad2bc634fc4194e857ccf594c0d54e620e64
SHA512c6ea679c4d41600311bcfe87b7d1e78a5067bb6e020a9b7c19acc11f6348a4c9ff60c2b06242f820f4becd187b11bc48cfc315ded404aa74a8e6d9167b8a3d8a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd