Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/06/2024, 02:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url.au.m.mimecastprotect.com/s/bUJ5CK1D9ncqQqAMtMXqsv?domain=surveymonkey.com
Resource
win11-20240508-en
General
-
Target
https://url.au.m.mimecastprotect.com/s/bUJ5CK1D9ncqQqAMtMXqsv?domain=surveymonkey.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133640154404358910" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 1144 4840 chrome.exe 80 PID 4840 wrote to memory of 1144 4840 chrome.exe 80 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 3604 4840 chrome.exe 81 PID 4840 wrote to memory of 4620 4840 chrome.exe 82 PID 4840 wrote to memory of 4620 4840 chrome.exe 82 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83 PID 4840 wrote to memory of 5092 4840 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url.au.m.mimecastprotect.com/s/bUJ5CK1D9ncqQqAMtMXqsv?domain=surveymonkey.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb7339ab58,0x7ffb7339ab68,0x7ffb7339ab782⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:22⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2160 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:12⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3892 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:12⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3116 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:82⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3148 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4232 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:12⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4092 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:12⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1824,i,8692589287918624064,11876963498123127935,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD578711b4b7623ed492bfac062fdafb789
SHA1ad1388fdcc27282d29b6d733a7a6faa068475eec
SHA256ef676de19a9c4cb0d6acda2bbaf0964de508bcd5be67605462883066b4a7a146
SHA512986aee0ac1a987cfc0191d84358970df6f53ff462074090b1d4fc3b32d85912732402788e810729c2338754350fa7d4e1e718380e442d5851b7bef8710ce424a
-
Filesize
1KB
MD57f9028ad9a0f9ef7e0c068c6205e6ec1
SHA149030eaf7e38c0ad9770454477fc891cb4d75c94
SHA2563dbb392e8a2970139c7cb2804d64f192ab727a3b22115ceab67807fcb0023d55
SHA5122cae9e577439f4406de2b03b27914c6936aca83c43d419808b70f27a30bb51fa5fb60629f62e0c78e0fe55680e05908f4191bde9423634bb03e30be503f37e77
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1014B
MD540e18d518a847c5b03740896a7b96da7
SHA1c90964984e5d9c2df8f003caf5f43ccd06fb8f2d
SHA2561d9c4d34f20053ba4b0dbd1e4f3fdf13aa41edb702c40a5c061675ab18a6df32
SHA512357490a39fb2106bca7bb03a413777f60b32b0a1ed9b4ef89ec1b0024364527f4c46d08ebf73dd553f47b6a58687d9de7266868f587eae25466e04cc5fe6d8dd
-
Filesize
7KB
MD5c4aab2d07081b67ff26a7bd180f55d24
SHA1a0bdafbb3722c211119c5146d84d84d9e16ee80e
SHA256969060f5fe688e199e69ff3bb602bac8fbe6b7519bc103f2cb6d55348bcb58ce
SHA512d6e9f583259eaaf7f455e7daa72e0559609481b8889866b1edee7b32f599ff8d4164cdb1c2930438c99b9fe8dfc218677976ce30d0e0bcabac53787605b9c3a3
-
Filesize
7KB
MD5f054a1592344acff312f5d14c437643b
SHA138fa507b1dbe0babb69c263b76cd322e0b2e6bfb
SHA2561b599872c63c68c9555b32b20415de053731b092bdd060f298226f56c8e2369c
SHA5120d6b41c0b25866d1f3fe83f4ec792c1b00142108fefb103e3b812a8a6838f44989d00b1c0cdfc9fcbff99b5f900957899c781968b003c37eaf8035a264158dae
-
Filesize
129KB
MD542b3215f74e146e1aff380544c5ea56d
SHA162afcaa36327137560ed2e92085fae38cddafeb7
SHA256ae912b08aa0e7cc1cc1bb8338baf7ace44a1e637c1dde0328d0e24fe310dd966
SHA51229720c216bc8c3b758afa5a8b6f0da5011f6a8aa9ebe2bf65f0cd31c233c2525a6473fc97198abd248d6c64feb7cbd15b9a2dc09dd1098ff9685f10cceb56902
-
Filesize
129KB
MD5873d265df34d9725d945f10baedbb3a3
SHA1e93b3acce59c36b8747cc3eab0f918077fb76abc
SHA25638dd0546ec6c281e60c5f3cacf340227df81ed9e73e9ff9f33561f63727e3dd3
SHA5122bd448c62c2b3d7544f5470d92ae940aad7b5e27ea5d665387bbea9a56fb55a93b013e5c0b593d075b56bd75f2ccfa665d85a87bf675dc06bbfc9c1c2d173f20