Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 09:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://appdatanettianport.cfd
Resource
win10v2004-20240709-en
General
-
Target
https://appdatanettianport.cfd
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133652509022565949" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2948 chrome.exe 2948 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe Token: SeShutdownPrivilege 2948 chrome.exe Token: SeCreatePagefilePrivilege 2948 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe 2948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2940 2948 chrome.exe 83 PID 2948 wrote to memory of 2940 2948 chrome.exe 83 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 2180 2948 chrome.exe 84 PID 2948 wrote to memory of 3848 2948 chrome.exe 85 PID 2948 wrote to memory of 3848 2948 chrome.exe 85 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86 PID 2948 wrote to memory of 992 2948 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://appdatanettianport.cfd1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8a6a5cc40,0x7ff8a6a5cc4c,0x7ff8a6a5cc582⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1952,i,17829502692614828543,17551182458257778908,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,17829502692614828543,17551182458257778908,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2116 /prefetch:32⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,17829502692614828543,17551182458257778908,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2332 /prefetch:82⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,17829502692614828543,17551182458257778908,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,17829502692614828543,17551182458257778908,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4552,i,17829502692614828543,17551182458257778908,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4644,i,17829502692614828543,17551182458257778908,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3380 /prefetch:82⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3848,i,17829502692614828543,17551182458257778908,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1564 /prefetch:12⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5180,i,17829502692614828543,17551182458257778908,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5008,i,17829502692614828543,17551182458257778908,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5012 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:3300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ce3428ec80c2566d1dc85d986800d4f2
SHA19c0af693f60a16171958d9420a974506b80f42e4
SHA256607eae8ef45f4cdebbe9d39652ff4b663407fe1e0ee8dff5425c46755942fb0f
SHA512769b855a269fee84213b2739e2f5de7a8cb1596f0952c01db3e5ea036abb3443a71ae8234052c13e9ea5f9547c4521e7756c19b3d8e8849dc1fbcc80e63d18b0
-
Filesize
1KB
MD511a3121926e5f31c94b00551a8cf2828
SHA1e5af5054bd40c425d0a63748e04f25c354fa8805
SHA2567f7925fd3ac27ca005b937b522bd91683731f636591a60d6c51d38696d69163d
SHA5129f7e2abbdb30ca3905f245447d732f4c2979782299a8483f876c3c2fcd93c2482276757e6eed59447cf74e569c7eadf91624527411b7ba181356ea5daeea53b2
-
Filesize
1KB
MD553bd6c89c8075e8ff0d8f5dca5c453e6
SHA10b64812261ced46d90e3370ffba249abfad4671f
SHA2565c006bdf3918d87fa27732f0dbbe7e38c3de00980a12616182b193a6837bb95d
SHA512c0ba9d6d28dc1524ab89155684a432ef0800fe4c751b2c5863382c6aeba5acfe9c740293a5b79a57b27d068ff4f5ca857dedf733fbd264a175a39c67ce2dcb4b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
12KB
MD5db279fa958626fe94e2a75f028a27b7e
SHA156bfb90e72287af29207d2842ef1402aa6062daf
SHA256eeb34e142581673763e985cf4c35a8894bf21f70001388998e80b504acb8a9ae
SHA512a3ec9b93110e8f0417664c5b05b273c94c5fa5815956b85e5598d2c0e2fb00a9dd34377c55bc0c09624822608a1715d3caeca981bd449ee727beb5ebc3602575
-
Filesize
8KB
MD5aa3097d6bfdb3c987c6e8db0e6d58b2b
SHA13738251289c26355395d96e02404bbeff1c8821e
SHA2569ff1f8b28b985a03c2232e3a7030fbc1a9b725decd75feed1a887cbbdc607d10
SHA5128513d937d64a0d0504800c455c13f0b805b2b5a7654a4cf95eacd614da8c7c6c0c2a582a9a1176d16fca08c21507a9af5086a1568c65f6e9f7537bd73927e12f
-
Filesize
12KB
MD5fec04052920ddc86d6054688504c284b
SHA14cf244f63639ad4dfd5d488ddab4937066b96647
SHA256ad113947a0cad75f9f0e24d661cbd3b71faddb8622da8889afcf7cac6648500f
SHA512bc16eddd452f32afbacd8b59c480a2b9e2eabf1b49abd2a69a3bbf9e549c6d5d891905d779424872634fdca2184dca39c20f4f9aa83ffe5583e210b57e00a1d7
-
Filesize
11KB
MD50a866e3441371effbc770de6fac06a9a
SHA19e98b6919868616673a0c699eb021d6e1f886d95
SHA2560d23301ad44c8deddd59826d92936ca2ab26cc29b521ab2fc041d6343159da5c
SHA512294ba90e8629cd5885a04a71ea44dd55a15da000f93f44be9e901842331ec788b4ac653760bf43b233070a9b64773daf5063a54b7fbe6186b35fcb06b80b1f39
-
Filesize
181KB
MD50dadeb13f34bc741bd6c73d1a26a5c7b
SHA15a970999a6204512843cc058e27ae3907c324fe6
SHA256826aad2c666c3b5dcaec777b83c07bafd8b55cf7d738f9c8511808c9911ebde3
SHA51291143b564bf92e98bbe1c38c988444d835f7f62e6cdde5d5929a9f048f524e6632ec969865f8925e9d69f2da6490b9ff33c8f5f57ad1a6eed42aa15613786a63
-
Filesize
181KB
MD519a890fef2ffdbefc357e934696d9f0e
SHA13103b40af8dbedd8ccdbcd266f23e736f7d5513a
SHA256e93df02eae4178748eea237df527289e14787d8f8034e10edd71148d3c1937b5
SHA5121b80f91dcc029435c71d03d210189905c6232e5960a4c33d107fa55ce33a7389be4b55c2a5ace4ff980df313d515e6a8667639fb3dfba436b4ce75801ba3c635