Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06/09/2024, 07:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url.uk.m.mimecastprotect.com/s/vWoCCmEVLUBY5npfOhxCR3nWb?domain=email.notify.vidoomy.net
Resource
win10-20240404-en
General
-
Target
https://url.uk.m.mimecastprotect.com/s/vWoCCmEVLUBY5npfOhxCR3nWb?domain=email.notify.vidoomy.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133700826613874407" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 4276 chrome.exe 4276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 4268 2316 chrome.exe 73 PID 2316 wrote to memory of 4268 2316 chrome.exe 73 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 5096 2316 chrome.exe 75 PID 2316 wrote to memory of 4400 2316 chrome.exe 76 PID 2316 wrote to memory of 4400 2316 chrome.exe 76 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77 PID 2316 wrote to memory of 3720 2316 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url.uk.m.mimecastprotect.com/s/vWoCCmEVLUBY5npfOhxCR3nWb?domain=email.notify.vidoomy.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9aac39758,0x7ff9aac39768,0x7ff9aac397782⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1716,i,7233678061343395015,5198119357618382508,131072 /prefetch:22⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1716,i,7233678061343395015,5198119357618382508,131072 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1716,i,7233678061343395015,5198119357618382508,131072 /prefetch:82⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1716,i,7233678061343395015,5198119357618382508,131072 /prefetch:12⤵PID:520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1716,i,7233678061343395015,5198119357618382508,131072 /prefetch:12⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1716,i,7233678061343395015,5198119357618382508,131072 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1716,i,7233678061343395015,5198119357618382508,131072 /prefetch:82⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1472 --field-trial-handle=1716,i,7233678061343395015,5198119357618382508,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD530d6a7aef5599b461574b5e3d8df07d7
SHA1387702a507770f4f2ee168acd4749a691c9d6d14
SHA25608fcab7e575b476a78a4bb57f7ce94945aeb37849d9ae68f0a45e432674e44ce
SHA512e45bde320f890ff16f0092e089e2455079ddbacca9fc5ede2761e8059dbbe73f06bc6238bab7b44a5107ef4cae6f62b03a7e71a54df2f5f79b25e9da83b423f6
-
Filesize
558B
MD553de5ab98826a53bef50993726bc9140
SHA194c0b46fc0c98f13b5307f59fdb61b36633c30f8
SHA256433859295ab16e062880a76800453072b5983ab9d677805f4de84d4d9f48a885
SHA51259003ca41ce0adf2a8a5e9f3b7f7f2b8818ae9352f62bd44e45c644e9987cf293afc2a28ddcdaf75f4c1fa2efcf021ae9522a77b9038844ef7422fabdc835952
-
Filesize
871B
MD59de81dbdfa5f9a4bf962b6b1825e609d
SHA1f6171375acd419e576c17e9e72c895e87e9ca209
SHA2569254b63f9e525ed3d825e4399841c6115d0b016d41d4e91b713c608a6a7e5ecc
SHA512f038202671ff29b4a457b05cac642d9b1058f4c15bbddf6601bed0a358923df1fe260fadbd6574c4af1051bf7fc47f0dbc1bb51f2471c345c405738693430cb4
-
Filesize
6KB
MD5878fecd8e1c8570b40590358c987261f
SHA164a98bdf50c8d7a6a476839797c113c3d028a634
SHA2563648eb97679cc0d0fcb86ba99a5e19b87728e210d4d6f503dec4d610353453f5
SHA512edda68ac0093f126d79f7ea03e22926dd948c794a40fcadf37989732c9493bf3ebd861bba58f79c6c878ebdd51e56971fd0a930f780e90b3e83a25f235fe7c71
-
Filesize
6KB
MD56c89bc29e319a095f7f03a2b63f845ba
SHA1bb22c96045b2bf0ce49c1d9cff282c33bf83e710
SHA2564bd4221f1c68bcce798d2a00f6bd077efda59032b3fe6b7874ab042022361b33
SHA5125c43b8a33adde7cd97d92fd63783762f529d390dfd9db716337ebc8e1244c2a7252c2eec068edc2136a9c1ff0d3714584d510cda99c795d362e4213386cc1c94
-
Filesize
6KB
MD5a5faad33501aa050d7dc081d33194d7d
SHA1f7177340a904bb833d089456088ee37fdb360382
SHA2564f6d1ab0088842d11656f012a25909c23a717f52ff08ceed846e8dbb02ae0407
SHA512a10100740b5fae9b3f1b9dc448ae570ce494453b78375410dac274635acfd364077df59c59743b929f960a94097b5f0637bed75982f622d502a2e52153e299cd
-
Filesize
136KB
MD5b965365e6a8df30e12110dd6722c87d6
SHA1ec90cce999aea31f6aea160357da8f4e71f6f819
SHA256ac14ed6e7ae677034b494e2d14f6edab2d8d33524f2011fafd7f15fd5bb6ab2f
SHA5124c1f0c0a900c8cae79cb6f977640b0b8c1cc987b96ccb9538a4551ae647d71f5fab6b5183a1d403a19122e42f420257b8587a93260e3989beb0d8fa421247933
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd