Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
11s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 17:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://d2v4yd04.na1.hubspotlinks.com/Ctc/5F+113/d2v4yd04/VWM7wT4LFrDXW18xVk36v40jdW1m0cDV5ggfvMN6N1vZd3qn9gW7Y8-PT6lZ3nsW57bHnp8mDl7VW3DLZxN2q7ZCYW18WzcV2-w4CjW4vmtRw757_PwW4NV3806_jCSKW3dS4Bq9gZGMLV3zgwD2CVSsbW4kMMnc5yMH86W8df6RV8drdBDW2L16r03Q7JZ9W8k6KhJ8Gd4lDW6vzwdp1y0L6fW2mhPzh5dy8LrW39mFxl4l-Cb_W66fZ8t4ngrLVV8K5Xc7zY-bFN3yBYH2BCcNNVT1J2H3lp3frW3vb9c83Zr3Z7W8sHHVp7DG2GDW83wgfr1Dnpj4W8t99lD51qYxrW91_JHZ30s-HsW3N90km1hzjK5W5vhwWJ7C1_w1W86WWJW8-h9P6f4Sv48004
Resource
win10v2004-20240709-en
General
-
Target
https://d2v4yd04.na1.hubspotlinks.com/Ctc/5F+113/d2v4yd04/VWM7wT4LFrDXW18xVk36v40jdW1m0cDV5ggfvMN6N1vZd3qn9gW7Y8-PT6lZ3nsW57bHnp8mDl7VW3DLZxN2q7ZCYW18WzcV2-w4CjW4vmtRw757_PwW4NV3806_jCSKW3dS4Bq9gZGMLV3zgwD2CVSsbW4kMMnc5yMH86W8df6RV8drdBDW2L16r03Q7JZ9W8k6KhJ8Gd4lDW6vzwdp1y0L6fW2mhPzh5dy8LrW39mFxl4l-Cb_W66fZ8t4ngrLVV8K5Xc7zY-bFN3yBYH2BCcNNVT1J2H3lp3frW3vb9c83Zr3Z7W8sHHVp7DG2GDW83wgfr1Dnpj4W8t99lD51qYxrW91_JHZ30s-HsW3N90km1hzjK5W5vhwWJ7C1_w1W86WWJW8-h9P6f4Sv48004
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133662305387749421" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 5068 5036 chrome.exe 84 PID 5036 wrote to memory of 5068 5036 chrome.exe 84 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 540 5036 chrome.exe 85 PID 5036 wrote to memory of 4680 5036 chrome.exe 86 PID 5036 wrote to memory of 4680 5036 chrome.exe 86 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87 PID 5036 wrote to memory of 1632 5036 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://d2v4yd04.na1.hubspotlinks.com/Ctc/5F+113/d2v4yd04/VWM7wT4LFrDXW18xVk36v40jdW1m0cDV5ggfvMN6N1vZd3qn9gW7Y8-PT6lZ3nsW57bHnp8mDl7VW3DLZxN2q7ZCYW18WzcV2-w4CjW4vmtRw757_PwW4NV3806_jCSKW3dS4Bq9gZGMLV3zgwD2CVSsbW4kMMnc5yMH86W8df6RV8drdBDW2L16r03Q7JZ9W8k6KhJ8Gd4lDW6vzwdp1y0L6fW2mhPzh5dy8LrW39mFxl4l-Cb_W66fZ8t4ngrLVV8K5Xc7zY-bFN3yBYH2BCcNNVT1J2H3lp3frW3vb9c83Zr3Z7W8sHHVp7DG2GDW83wgfr1Dnpj4W8t99lD51qYxrW91_JHZ30s-HsW3N90km1hzjK5W5vhwWJ7C1_w1W86WWJW8-h9P6f4Sv480041⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa89d3cc40,0x7ffa89d3cc4c,0x7ffa89d3cc582⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,15398727593631902675,3300767719282646147,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1920,i,15398727593631902675,3300767719282646147,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2116 /prefetch:32⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1692,i,15398727593631902675,3300767719282646147,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1724 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,15398727593631902675,3300767719282646147,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,15398727593631902675,3300767719282646147,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4412,i,15398727593631902675,3300767719282646147,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4864,i,15398727593631902675,3300767719282646147,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD57460a7407716b918fc60d2389210530b
SHA1d41c03c477e420585166cdd3096c335cac532ef3
SHA25694db5b67df249cc9cc672be3ab166ed00791316109af8f2fae7ab3546ea9aa55
SHA512f255c5207e298a082d795c2eab40ed524a6ec61ef72b85876f0c159b75ac979f816407fa8c0a78737cd2da77d366b6793452d8e2b2555a99624f762517dd7436
-
Filesize
92KB
MD54e35c0135926672410bc8b946665966f
SHA1967fb31a9ec04756897ef106946f1379f5d49a42
SHA256fbce63ab36c03b5975ac43001bb1e3f043d5a45eb77aaa680e2266569482bdf9
SHA5129a1fcac2ae2fa00c61ff72b3f12550f4c1ae314ad9dd67a2b5d0f9bc917126ecb29972291e0a30b6aefc0c382fc5b1cd037f76d57e1f913690ac9bc8311c3604