Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
23s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13/08/2024, 19:25
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://roadtest.u-car.com.tw/share/platform?url=https://petite-ice-ancient.on-fleek.app/[email protected]
Resource
win10-20240404-en
General
-
Target
https://roadtest.u-car.com.tw/share/platform?url=https://petite-ice-ancient.on-fleek.app/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680507892687267" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 1452 4776 chrome.exe 73 PID 4776 wrote to memory of 1452 4776 chrome.exe 73 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 4244 4776 chrome.exe 75 PID 4776 wrote to memory of 596 4776 chrome.exe 76 PID 4776 wrote to memory of 596 4776 chrome.exe 76 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77 PID 4776 wrote to memory of 292 4776 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://roadtest.u-car.com.tw/share/platform?url=https://petite-ice-ancient.on-fleek.app/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbe5449758,0x7ffbe5449768,0x7ffbe54497782⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1648,i,8848439966323047800,2086056958851840627,131072 /prefetch:22⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1648,i,8848439966323047800,2086056958851840627,131072 /prefetch:82⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2028 --field-trial-handle=1648,i,8848439966323047800,2086056958851840627,131072 /prefetch:82⤵PID:292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2784 --field-trial-handle=1648,i,8848439966323047800,2086056958851840627,131072 /prefetch:12⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2792 --field-trial-handle=1648,i,8848439966323047800,2086056958851840627,131072 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4428 --field-trial-handle=1648,i,8848439966323047800,2086056958851840627,131072 /prefetch:12⤵PID:424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1648,i,8848439966323047800,2086056958851840627,131072 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1648,i,8848439966323047800,2086056958851840627,131072 /prefetch:82⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8fee6cda-b823-4922-8c57-5be9445981f1.tmp
Filesize6KB
MD5f8c609c62a122a08214efd73a656c5e0
SHA1d7c54405401480c22f20c10a140dfbcf551b7a6e
SHA256723e5dc41a4e2e606c2e7bd937237dc517b97c77e666f2e1f7c74d6c3b9c2356
SHA512cee9b6a29b30f093732ded214d4003ad580637ee69f0fe0f47c4f8afb77a127e6fb746afbd407847b680bbbd45c1e942d469489c9d540df09116608b5f96d087
-
Filesize
874B
MD5bd6a4f206f19d6b58a5472eb0524fb5b
SHA1af713c3f925218165d4504b8e6cb3f3e8b8a3bc8
SHA2561311d0f7b291beec4f25998d4c4a3b658f6e18be6946476852a8838e88b84707
SHA512106768d0530dc4a6e4d626fede5ebcf774dfbccdecab3d911280ef3aed6e360c8b119cafc841851332bd7e6c49155b84397e675943b4b1a9d7c5f9eb21f2f974
-
Filesize
136KB
MD5897b7aa3b0cbb6d7fb0eb7d145d2693d
SHA1b6096f18fd012d0866069ff4964a4f7109ea409e
SHA2564262d407bebc84c451c1a0274b84ca7c7e68f6317dff67996edc0cc863867599
SHA512a5ed557a3d216229c9d16e971c02f03bece9d6c4e249143b4ec5ed2c20031c0e6ade6ed2faf3dfc2fb2271894023bcc18f706de263b6dc3047499ede589ba40a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd