Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 13:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cresta-awards.us18.list-manage.com/track/click?u=388eaf4aae507134601a69d81&id=88329f4f8b&e=918c26076f
Resource
win10v2004-20240704-en
General
-
Target
https://cresta-awards.us18.list-manage.com/track/click?u=388eaf4aae507134601a69d81&id=88329f4f8b&e=918c26076f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649196827147020" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3336 chrome.exe 3336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe Token: SeShutdownPrivilege 3336 chrome.exe Token: SeCreatePagefilePrivilege 3336 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe 3336 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3336 wrote to memory of 1084 3336 chrome.exe 90 PID 3336 wrote to memory of 1084 3336 chrome.exe 90 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 4248 3336 chrome.exe 91 PID 3336 wrote to memory of 1144 3336 chrome.exe 92 PID 3336 wrote to memory of 1144 3336 chrome.exe 92 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93 PID 3336 wrote to memory of 4388 3336 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cresta-awards.us18.list-manage.com/track/click?u=388eaf4aae507134601a69d81&id=88329f4f8b&e=918c26076f1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7da1ab58,0x7ffd7da1ab68,0x7ffd7da1ab782⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:22⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:82⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:12⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:12⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4100 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4372 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4176 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4660 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:12⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3212 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4656 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:12⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1656 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:12⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3080 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:82⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2980 --field-trial-handle=1884,i,11591448665721362355,12724625138771793722,131072 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,8810623976767776473,12198967845557146846,262144 --variations-seed-version --mojo-platform-channel-handle=4108 /prefetch:81⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5367e88010bebce45d9d528c164c9b727
SHA1fc9b6e9a7e7e8846e12b1882b936c5ba8c36a231
SHA256da21feedef7726d891cc306bd0fb72cc4f56c425e5203d584028007e0ff4431d
SHA5123d980505a50d2d107ff3dfad9c7bfa4a8cc5c9ab533e207ff047ef9147c9b133d65d0a5c7cf86c0bdfc1b45bde1ba1bda4c794c7dab010aef49a8ee1fe633495
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD51ab05a48cc9674ad6486daeaa5fd3e41
SHA17e5d198b7f81993351acf827fa7fefeebaa14cde
SHA25630fe5ffbca081e1991ac7933b8b15b4742146ed3009fa5837a5572ec294436f0
SHA512ad0920f004fc0e82a7c856d1c7c052da474154255f0126766af3927efa5d22cb24850216164992166a9a465452be3c5ef48bd7535299ab0a0444c6196073424a
-
Filesize
1KB
MD5b50116a3e0cdc9eee07697787d95f5e4
SHA1d6c6afb8036b7cdab8fbacb17c9c6e839d7f8345
SHA256713d27e71c53ca5df09031256a99c6bcacfc1a5f6df3374d4316660b566eaeda
SHA512664f52a2dbe8389564f2f07343e176b45fca09ab3d8fb3b4f8d80d3e73cdf62a3dd001ecbddf411976d623420023a8f668a5b294e748a4a93b23b82672462d52
-
Filesize
7KB
MD5214d2e94c772b0fe385ae1626425efff
SHA121c25a8bbde6865f674ff751a6b05c3528e969dd
SHA2564dfa5cba8aa73e0f889ec53af421be2a060c7450ae6cdbcbe475cd84f2ec1345
SHA512897c934a8bf55c116e8874152091b25e45a1df424252c69c6a92332c044bb0835848346d1dc1ec971cdabd26f2787ccf7134bfc2e92d940d34eb4b54e3c2d830
-
Filesize
144KB
MD54c6af890a5733c5c3f14569e72d122c6
SHA12d599a7d74abb4742d4d3fade1a7300a8270ddef
SHA2561bd34865d84efced0a6a592cb010e884760dd303fd6bc8030654ea3bbad6cda3
SHA512e19d11bed57bec88311c18edb3af906f9db944da52376d737484a3f5ad89ac46189232b7a18f373524029dd27c959c5a36c3120819a9b04951cba4b89f7cf2f4