Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 17:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://substack.com/app/app-store-redirect?utm_campaign=app-marketing&utm_source=app-page&abti=d5670c99-019a-4d09-af82-a51239b387bd
Resource
win10v2004-20240704-en
General
-
Target
https://substack.com/app/app-store-redirect?utm_campaign=app-marketing&utm_source=app-page&abti=d5670c99-019a-4d09-af82-a51239b387bd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133662304449219974" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2732 chrome.exe 2732 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2660 2656 chrome.exe 85 PID 2656 wrote to memory of 2660 2656 chrome.exe 85 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1736 2656 chrome.exe 86 PID 2656 wrote to memory of 1904 2656 chrome.exe 87 PID 2656 wrote to memory of 1904 2656 chrome.exe 87 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88 PID 2656 wrote to memory of 4868 2656 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://substack.com/app/app-store-redirect?utm_campaign=app-marketing&utm_source=app-page&abti=d5670c99-019a-4d09-af82-a51239b387bd1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7770ab58,0x7ffe7770ab68,0x7ffe7770ab782⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1836,i,4709764121905545278,753563570719035634,131072 /prefetch:22⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1836,i,4709764121905545278,753563570719035634,131072 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=1836,i,4709764121905545278,753563570719035634,131072 /prefetch:82⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1836,i,4709764121905545278,753563570719035634,131072 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1836,i,4709764121905545278,753563570719035634,131072 /prefetch:12⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 --field-trial-handle=1836,i,4709764121905545278,753563570719035634,131072 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1836,i,4709764121905545278,753563570719035634,131072 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1836,i,4709764121905545278,753563570719035634,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54a263a071f5da27e4ad855b2eb258481
SHA17e4471af6a00a3c98cff262da88efbbc3a70a689
SHA25638b79d8a7e1132b39fe1f43bc26172cbe17e6ba16ea80951f3694583133bcf08
SHA512f5b8e6cde700d058ca050e36243d8d5e75f2b05cb32ccf788b0b2137f9f0947c886bd6dc739dac5ba9cbe4293fa7193e042d681b7508bf8c211a094ba361cef1
-
Filesize
2KB
MD5162d1696f4f58a2996533ca4cd35a66b
SHA124791e6caa7ce9271a1636cdaeac321fe5ccf02c
SHA25680387825add2241d9f13293acbc12a25bdfb53e323837e7148bd5636cdd1a016
SHA51227c2fe44df4c5ee6bb2cce4883d3fb3a3ff4eee53fac7102263630c0449aeadf03cdde9a30d66e6198a62bfd4216a15dba7fda7b6a81d6c67c7c8c7bbae8d72c
-
Filesize
3KB
MD5b5a97e9d664ada2ffe4d2d77a66991f3
SHA1d48dcb0524547c154ca6de105036b55e5130c8b8
SHA2567c6fd62916a09c85662040f412369fb7e106e48b3b6e30fb8bdf70e46642069c
SHA5123005f97be91036119495f0c4f7db26d9488441a830b12a0eeb176fca910fa7056652ff2ebde87265d0011e067d8593812dd5c276d9c8d0603c448281c6b7ef01
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD561e854d427e37c02a3c0de85f0aa9c14
SHA14950bd29cf1a0fe16e7976b460319252e333ebf6
SHA256d95721d758db38bde93d5b66af0cf7b057ded90f4cc54dab8c40ebae7b5d12c1
SHA512b74a32f01da60a46dc7dcd6c7e7fa3e4d7f17f2dc03cce70cfc64f0ebd034fa8724584d7084e8eb8fa28af943fee2d3421530c17edb85a814651923e654dc593
-
Filesize
1KB
MD568a46c0640cdf5781c0523b3499d7000
SHA11d85b5d54f3c90e12f370de69132ec0fd55e759d
SHA256ee3f8c3dbe8a0a6ce616a7b308421e681bd8713b3d65717ffea3b11b9c4a32d7
SHA51225426d060ba524b49bb190c6ea2a170a8d5f8531600d19cd527c6b214e4a58943e4d0762ab4a695217a0b7def5c1b5e34c9c6be70f5c18e035520d72a0b9c1ca
-
Filesize
7KB
MD5553a140c946aa4f9cc4056bd43180e09
SHA1c936e05429a75d863c5c2ee911dfa375850df0ac
SHA256f2c449ee49fd0b961cefeacd212a16335d5911b63f74d6801b0e51fb9bd488ef
SHA512a1b1ccdfb7fc8d8279331456d7a68adcd1f9f70d54f8d65e3e74cb44e1d7f25ea7389cbd37ab0968558e6bd8c7f64c0ccc6fd93c12ffdef34ad608dcd2ad127c
-
Filesize
7KB
MD5e422c21472b33ed4fab96694f0e837e0
SHA16d658f74b855ccf80c58fde6bd0911eb225ef8e9
SHA2569ef22d34f8519c0970bdfca4f50e5c718a2074cb4b58a006999193dc5a93f858
SHA51260de2fe927808b5b28e155faec6a337697ff23f4e8c7a660c19aa00d361a776763983b5b59b4beee7a10f5899375dff58b2d76a93620e9d85f1bfc9124fc1c3f
-
Filesize
144KB
MD541ade2a8f7dc288428656c7245f66784
SHA1f3f3e29dc13bc24330fa9d919ec9be3e532a6642
SHA25666bf9d7d2494f5bb52e2cc5388bb5c066fe95941ad2ebb8669591db925e6832f
SHA512be344d4c25f49b8484bfac0aa6f2470d8dca176f7eb7e4512c8a24e3dd7502258d8f9be380db770350c68267418e80953bef27203742f94e7c9c92bbe6bc0b3c