Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 21:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.sfmc.empowermyretirement.com/?qs=b5b15e9a767fc487589ded73ad21dcb1982389f28cdaabc471b319f70e5f01d99736ddee1cbe6a656c744eaa7ea0998edaa6f6c6ca1057c2
Resource
win10v2004-20240508-en
General
-
Target
https://click.sfmc.empowermyretirement.com/?qs=b5b15e9a767fc487589ded73ad21dcb1982389f28cdaabc471b319f70e5f01d99736ddee1cbe6a656c744eaa7ea0998edaa6f6c6ca1057c2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133639985155991763" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3558294865-3673844354-2255444939-1000\{AE51E7DB-7DD4-41C2-B671-F5771E8BFC29} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 3908 3532 chrome.exe 81 PID 3532 wrote to memory of 3908 3532 chrome.exe 81 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 1056 3532 chrome.exe 82 PID 3532 wrote to memory of 3272 3532 chrome.exe 83 PID 3532 wrote to memory of 3272 3532 chrome.exe 83 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84 PID 3532 wrote to memory of 772 3532 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://click.sfmc.empowermyretirement.com/?qs=b5b15e9a767fc487589ded73ad21dcb1982389f28cdaabc471b319f70e5f01d99736ddee1cbe6a656c744eaa7ea0998edaa6f6c6ca1057c21⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0f55ab58,0x7ffd0f55ab68,0x7ffd0f55ab782⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:22⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:82⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:82⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:12⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4064 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:12⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4344 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:12⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4336 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4588 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4920 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:82⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:82⤵
- Modifies registry class
PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 --field-trial-handle=1880,i,11457412602184694909,4374286937011344287,131072 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD536339eeea517c1314f76b16794baf186
SHA13444641fc7c17c72db25d896b03e0b55a9a55017
SHA256e092d562c5810f17c5a10638ac0d30bc40c64452d9043cbdb57a4a612ba439ea
SHA5121d123b8be6dac0c7a23f6fc70b6f4c3b2a633aa54fd78c22cfff2e137e330147a23c65575aedf00f7e8aee2e71884216732f81e19dc98c9a11517f58e60bb8dc
-
Filesize
7KB
MD5059cfa6f683e1ed13e2a7aef6db677bf
SHA135cd0331187a5b27ab9579769c1dcee1a9cecf9b
SHA2566b583e68070fe32f4bb70086bcb9f906293cebaf702a17ddc7141d977ed457e9
SHA5122a2d7f8436be54f8681dcea7b076096ff515c5bbdd09b5bad871c1e8d85248a49f355d958a257482ff7c4512682928b7ffc5f361dc4e96adee907372111558b2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5779a4.TMP
Filesize120B
MD5dcdcf129f80f4a0c2cb737af7df4208b
SHA18d160b6f5c79d927b95240c827683f325e25a52c
SHA256f5677204f5fdc7ebe1414b86a098cf930e3bf60aa69583d6d0fc700cb90de504
SHA5125cbc064ab491fccc9b0ec486c06de46b62e15d183c12af98b1acf2dc21aad98e931c1f98e41371d7c693a5ee2b5782da78134f15979f366d8f590006129adbd6
-
Filesize
129KB
MD5f04942dc1b60f504bc495c1ceb21841b
SHA1179cfaa4b69ee7d354646337ec79287a3d3cb37a
SHA2565430bfda864160aad2bd96bbd3d0bdf19ca2e54fa4681e19070e99786f2c063c
SHA512f2d6e1072476c6ad86daa8ddecbb3b3bd982e185b2795aebb67dad9197970c2b323e9a43ce1c6f09fe90967bfff03bcb29be703da9771c24935aca3f8aadede2