Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 03:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://visitor.constantcontact.com/do?p=un&m=001V6jAETqLKWuJnYgYg1rlWg%3D&ch=cb5b36a0-7e21-11e3-9f94-d4ae52a45a09&ca=51eac962-3744-4335-8c7d-d072c55b3d5b
Resource
win10v2004-20240508-en
General
-
Target
https://visitor.constantcontact.com/do?p=un&m=001V6jAETqLKWuJnYgYg1rlWg%3D&ch=cb5b36a0-7e21-11e3-9f94-d4ae52a45a09&ca=51eac962-3744-4335-8c7d-d072c55b3d5b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133628948598816823" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 4320 1460 chrome.exe 80 PID 1460 wrote to memory of 4320 1460 chrome.exe 80 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2060 1460 chrome.exe 81 PID 1460 wrote to memory of 2264 1460 chrome.exe 82 PID 1460 wrote to memory of 2264 1460 chrome.exe 82 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83 PID 1460 wrote to memory of 4472 1460 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://visitor.constantcontact.com/do?p=un&m=001V6jAETqLKWuJnYgYg1rlWg%3D&ch=cb5b36a0-7e21-11e3-9f94-d4ae52a45a09&ca=51eac962-3744-4335-8c7d-d072c55b3d5b1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1688ab58,0x7ffd1688ab68,0x7ffd1688ab782⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:22⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:12⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:12⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4376 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:82⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4504 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4656 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:12⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3296 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:12⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:82⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:82⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4600 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1568 --field-trial-handle=1912,i,6188140051994912440,17174945699446131697,131072 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5fcb683c601641205ba4c1a865c9fb340
SHA189140acda71a84a5c79bc04f7230e824b7cb2189
SHA256dc92b15b40ce043c8f2b5dc3bfd4cfda5382655eb7936869498702a450869775
SHA512862dff2ba4010f89447e71f11c6d2523e16d6e1ce978add9a72d681318f9af26e2394a48c8a58bd7943f3d7fa0abaf24e79f2e0759b208b3ba815d4739a5446f
-
Filesize
257KB
MD5ea54b4292e43d481e14ac09bb0b06301
SHA11e3a709f6e78734dd5654ba7826b0ce6576901ff
SHA2563abb4359e8003a07855b4ef816b9435e3a071a86c8882d4b210e11b0a5fbf01a
SHA512055fc717153b27c905ce81dd4fe9ca551264d0619b6e77325f339d1aeb47ade4c12bda5ccf39247d0f2f6976a1f59e0287279109164a54c6c5ad47c61890f847
-
Filesize
257KB
MD5b6db0615c8f62828968a3c05db6fe229
SHA104c6c80cff4f84d8c92c71b871f50f6da145357a
SHA2562ef55d1fc22e4be6e48fb3555f0c3e00d67d26b0f5c4158eaa0fe253afddfcfb
SHA51208403972f4b4c4c5aa8456e9e0504a11589c299629aef6bbc83cb178d1d8a8445b0b56866b679b5103bc6372018ecc717a27f8ed2cb69c9d0dec42a147168d50
-
Filesize
91KB
MD56021d1a71181baa5fbef61d268bfc60b
SHA1d3df060e13e33a9f1e5879e6ca26ca434094311f
SHA2561e4c5b4c4a1487f6a01c70c89cb354d2dc90a639d2a4d6279b7fbb979ccb76a7
SHA512a23eb1232e6f004e95e20325824f245036bc173635060348d2c61504179121ec773e87ea1276e248e0ae0198e4fbaa4bfde5f61473b5a6b745daaf6ee7448061
-
Filesize
88KB
MD5fe6368443b69bff050079323ae8cce45
SHA12380c73c6c23840b689ba8b43a11b15c2fa7da1d
SHA25621aa07310a5df3c7934101d0c372743378d22de67cc913c7c2e56d3b8e25a190
SHA51294e1aa0ae8f9be5aedef4183aa598c8284ef2dab135109ccf25f18b1265a986997a4def33b1b483f13bb0cfb3475ae003bf36920690f1a8bb20bdd9443fb67af