Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
31s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/07/2024, 14:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://office-microzoltonline-certification.org/office-aus/AfIpfKGf2XJxS_WrdMNkszHbvUVYDkFZPz-Vq6Aqaug54vgb2apsffp5s4trjp22w5gdmsztdw6vvohecwj7h6kflaUw/
Resource
win11-20240709-en
General
-
Target
https://office-microzoltonline-certification.org/office-aus/AfIpfKGf2XJxS_WrdMNkszHbvUVYDkFZPz-Vq6Aqaug54vgb2apsffp5s4trjp22w5gdmsztdw6vvohecwj7h6kflaUw/
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2536 1792 chrome.exe 80 PID 1792 wrote to memory of 2536 1792 chrome.exe 80 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 2520 1792 chrome.exe 81 PID 1792 wrote to memory of 5020 1792 chrome.exe 82 PID 1792 wrote to memory of 5020 1792 chrome.exe 82 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83 PID 1792 wrote to memory of 2160 1792 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://office-microzoltonline-certification.org/office-aus/AfIpfKGf2XJxS_WrdMNkszHbvUVYDkFZPz-Vq6Aqaug54vgb2apsffp5s4trjp22w5gdmsztdw6vvohecwj7h6kflaUw/1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdaeb2cc40,0x7ffdaeb2cc4c,0x7ffdaeb2cc582⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,9877314278660453388,1825268811247700380,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1852,i,9877314278660453388,1825268811247700380,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2060 /prefetch:32⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,9877314278660453388,1825268811247700380,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2200 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,9877314278660453388,1825268811247700380,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3080 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,9877314278660453388,1825268811247700380,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4396,i,9877314278660453388,1825268811247700380,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4388 /prefetch:12⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3376,i,9877314278660453388,1825268811247700380,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4540,i,9877314278660453388,1825268811247700380,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4504,i,9877314278660453388,1825268811247700380,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3500,i,9877314278660453388,1825268811247700380,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:3904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5a4cdcb7e7d79f45d3a17125ad4a6134a
SHA18bfde0cde8dedd07dec0e9308c760ef4d7719786
SHA256f2244f68592dabab9f0dd26fbcbb7fd527812e2dc32aa6cd3f2dc71a09ad0f00
SHA5121618dbed5b9e8902f13aaacf6ab9dec0f7b96ee7a9814591c4003931b2531bbc6f217ad4821b8229f6d758ace61c4b94335cdd556dff75d976e91910143dd45b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\658ffb3e-fc30-4b7b-a28a-49f256511c7b.tmp
Filesize524B
MD54aa74995c6979486aded1e5d1c6eb009
SHA19962e744b6c5d550243f1c6a053b89730d24409e
SHA256d862ae0abed96fe7c42481d77c448785809193d77ebb7a41ccade36585505882
SHA51265d524d9ea70bbd856930f1f7fb4cdc4c86c677b4cf470c75e7553a6736a62f1e4e3c2a8f4bc048800aa7a78322dd51ed29a76fb6c1c6f3d8fa7fdc7354c0f47
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD51ff91f4a0eed4e62ba8ed3aab97f85b1
SHA1c4f0c732238261c7091a15ba21aec2bd8ab1955f
SHA2560c3144cd963ea90659baf38bcff7530e529773bbec4c2eb9ce7c70b7338510c3
SHA5126e2488ce8e85b724bb8f66a16f8fa6113936762001381db76d668adfd0bbca0d86c058b613cee4ee6ec328cbe9026fcbad9943d0a2986a24c5380fd74fc4b60b
-
Filesize
8KB
MD592b6708a6b3e766071f78da0f2ac263b
SHA1d55b923df70b4a6fe5a3f31c50c2d2e3d80ac624
SHA256b5676d9ae800b8b046fb484ec6bdb0ee7bae6b03536d06b3ce2bac8366827f20
SHA5120980d17fbd01fe6797ecae4fbb6fb41c9b65d2636aafcdaece765e0bec08845e05e94d768d39ea4105ea4ee8c37b26f2649af0e47e0ef84a975353bb404c63aa
-
Filesize
8KB
MD5ecade511aa8b621d166f8e5a3947d261
SHA15ee87b335001dfdfc54c29402aebd4e1d63f908b
SHA2561307105d63ffd8c313c5a65be8c03397ad929af12a089d6469aa7e8cb5742074
SHA512a1784c24605e2ba3b8ff3dd00663966a357549d941304ee03a631f68b7b070d44198d92c92104b76e084ebe22d692a2c698d3b806354f84afa65bd71f94ccffc
-
Filesize
92KB
MD529f8282e619d7f299094509114537c53
SHA1e64c7914db6335ea1963f4a068decb999c10ed9b
SHA25614dcd432df74c44fb3d2dbe1f592ddddb2986e4be41b8e32ea64410034f9b74e
SHA512cd83dfba38f6fb0dc5ad8ead05b894a3f04f520891260690e6b5c986e125737fd9f7f9d926908e186ed64dd61ce3f20af90ff7540bcbba23efc41a91e6d2b0b2
-
Filesize
92KB
MD569f1721f29632b8deba9c49948076ca0
SHA1bedd2921612e440e6720ecc72bf995d43dd49f99
SHA2565e9bc2f07a835770bdcc8e696d335e38ec2038b6165ee9a35e0bf55b192331ea
SHA512bc6e863d0e62faa29a58e015e9162452a2d8ec1c05de6dd8f7b002e1b1d5cd47bf3de1cd0413c3bc5caec3e46e3d9706b3a9c1c007ad2259b7f507ebd1ab2ba1