Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-es -
resource tags
arch:x64arch:x86image:win10v2004-20240704-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
22/07/2024, 15:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://alzheimersdigest.net/ZKpva/qHFFhjaEux
Resource
win10v2004-20240704-es
General
-
Target
https://alzheimersdigest.net/ZKpva/qHFFhjaEux
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133661357719475842" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3436 wrote to memory of 404 3436 chrome.exe 83 PID 3436 wrote to memory of 404 3436 chrome.exe 83 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 2652 3436 chrome.exe 84 PID 3436 wrote to memory of 4308 3436 chrome.exe 85 PID 3436 wrote to memory of 4308 3436 chrome.exe 85 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86 PID 3436 wrote to memory of 2856 3436 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://alzheimersdigest.net/ZKpva/qHFFhjaEux1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c92ab58,0x7ffd9c92ab68,0x7ffd9c92ab782⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1916,i,11193384395212908195,13644196766805124319,131072 /prefetch:22⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1916,i,11193384395212908195,13644196766805124319,131072 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1916,i,11193384395212908195,13644196766805124319,131072 /prefetch:82⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1916,i,11193384395212908195,13644196766805124319,131072 /prefetch:12⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1916,i,11193384395212908195,13644196766805124319,131072 /prefetch:12⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4372 --field-trial-handle=1916,i,11193384395212908195,13644196766805124319,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 --field-trial-handle=1916,i,11193384395212908195,13644196766805124319,131072 /prefetch:82⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=988 --field-trial-handle=1916,i,11193384395212908195,13644196766805124319,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a8a804c35de5c7bc73c9e2bd5a239cb1
SHA1e42eadc3a63fdbeb142b73df797e9f498d6cc513
SHA256d9f5103da3299f2c909089e7409decf1aa2072c43d4e231652fd76829293afa6
SHA512826d5b25cc234795ca91fd8b9d5da2c165bdf145cfd2239a6e7ed789c19878b4dc4cd3f29bf4253059d7163c5789a92bdb55e1bb9c3fe7c3cec627afeebdcb17
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5c8beaf5a030cadf50900d5435a31990b
SHA180932a06d247b5959683913d1b2463e90787e772
SHA256a6d42d5ea3aab1b698d663c1b9852ae7dd0cb1faa9ed85566e2003b52d74dbcf
SHA5129ee129e278f4b1424e5b8be428b4b330c9086213dba3a891a935f746c23163698f8c0c64e9d56ceb03a7c9655fad2c776a84017d00207caee827360f2b9dbcb5
-
Filesize
144KB
MD54423e5a01a95cc2ce7009f0d2cfc2cf3
SHA109016593d07b84641e5f94e30ba150b8656dd35f
SHA256300bab86ce3da985d498b67ae9f037d09d0831d33c476fd5d1651f1942fabb4a
SHA51218651df6633e3e80d8898d0cd075af000c4964c568575ecc375c0718e238ade0a23b9bd9a3b932c0c39ec6b1174c74682dddfe6ac903c855418c0c7dfeda5b1b