Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 16:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shoutout.wix.com/so/fdP6evAND/c?w=M7NzM0zSkkC4uBpekDt6aT_MjiXH62LrQj6a_Xd-kPk.eyJ1IjoiaHR0cHM6Ly9jb29pbmctdGhpbi1tdXNpY2lhbi5nbGl0Y2gubWUvIiwiciI6ImFiMjUwZjQzLTk1MTktNDM3Zi1hMTA5LTM5ZGViYzQ4N2VmMyIsIm0iOiJtYWlsIiwiYyI6ImM1MDFkODY4LTFkOGUtNDAyNS1hMmQ3LWM1Zjg5NGZjODAxMyJ9#?email=am9lLmRlbm5pc0BzYWljLmNvbQ==
Resource
win10v2004-20240802-en
General
-
Target
https://shoutout.wix.com/so/fdP6evAND/c?w=M7NzM0zSkkC4uBpekDt6aT_MjiXH62LrQj6a_Xd-kPk.eyJ1IjoiaHR0cHM6Ly9jb29pbmctdGhpbi1tdXNpY2lhbi5nbGl0Y2gubWUvIiwiciI6ImFiMjUwZjQzLTk1MTktNDM3Zi1hMTA5LTM5ZGViYzQ4N2VmMyIsIm0iOiJtYWlsIiwiYyI6ImM1MDFkODY4LTFkOGUtNDAyNS1hMmQ3LWM1Zjg5NGZjODAxMyJ9#?email=am9lLmRlbm5pc0BzYWljLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133703744769317330" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2800 chrome.exe 2800 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2800 chrome.exe 2800 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3412 2800 chrome.exe 83 PID 2800 wrote to memory of 3412 2800 chrome.exe 83 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 4608 2800 chrome.exe 84 PID 2800 wrote to memory of 3236 2800 chrome.exe 85 PID 2800 wrote to memory of 3236 2800 chrome.exe 85 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86 PID 2800 wrote to memory of 816 2800 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://shoutout.wix.com/so/fdP6evAND/c?w=M7NzM0zSkkC4uBpekDt6aT_MjiXH62LrQj6a_Xd-kPk.eyJ1IjoiaHR0cHM6Ly9jb29pbmctdGhpbi1tdXNpY2lhbi5nbGl0Y2gubWUvIiwiciI6ImFiMjUwZjQzLTk1MTktNDM3Zi1hMTA5LTM5ZGViYzQ4N2VmMyIsIm0iOiJtYWlsIiwiYyI6ImM1MDFkODY4LTFkOGUtNDAyNS1hMmQ3LWM1Zjg5NGZjODAxMyJ9#?email=am9lLmRlbm5pc0BzYWljLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8e0d2cc40,0x7ff8e0d2cc4c,0x7ff8e0d2cc582⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1952,i,699191685819502204,16039463486713607797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,699191685819502204,16039463486713607797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2164 /prefetch:32⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,699191685819502204,16039463486713607797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2432 /prefetch:82⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,699191685819502204,16039463486713607797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,699191685819502204,16039463486713607797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4588,i,699191685819502204,16039463486713607797,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5aa4e979fed67917cf11b173dbafedbf6
SHA1c2331ec66ff030366285564b5b3c5553aef9c9f1
SHA2567e3c36199d8a691a36a5b0b909f7747a471037301e7176596365ae9a55d95261
SHA51245abba364dac72d598c9094a1295d3f77b00d55a5cbdef0d4bd5419a30bccaec28dd6c0c1de2fbfa88d56143a03f01fbe757ddd69874d4f9724b8991342572f4
-
Filesize
1KB
MD5ffa0cf4d78188f312832c25f5a6a05cb
SHA1130cfe4451727e47b2a62785b4aff84d1412bb48
SHA25696977c4b11e9408ee4d3227b0fb5f2642277cbd0638f07b13e1a937cebc130d9
SHA512ebd9ceca8e52cc6c55b07f587e343a39dd0e80d90790b673ba816677d039e011eee33f43e89bac7cffbc6d75e2537b83d80102670bdfba02deeb6f328088a213
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD545e20e505a0d3194dd106bd028b18850
SHA1c3d577b5054a4b7c1cc1302aca1349ca3b1c96c0
SHA25653b26985d4e71c9c666db4eb3ae1748c87a9aa054fc8cc195d05045292361ea9
SHA5126c54c08cf25984b03d26d58d3ef019e0475daf7fcaa7fcd44e61067bfd24c0a677779ffac5e082c96d2d8bcc151c7790515e3aa216bf48648eab7c17095795c5
-
Filesize
9KB
MD571df03e7064d088e539084f31e448c30
SHA19d4e01d967d17cf3661437c97819a87323629006
SHA25632c2e24702e465b5477c29ce6eea1cdb1368ab32f27aae4fcd8094333f7792de
SHA512c8fe6376d0673855e107579f75dbd7be0d21b1e840f1cba97d2102e1a65895a412636be88a2b36aa18eb5d2327c1fd91bca52b4235001bc839408fbe423e785d
-
Filesize
99KB
MD5912f4361eaf225259839a6a9d7f3b888
SHA1c45ddd886f1be0b82b022bea420df2a5061b4ef7
SHA256ed2cbbfbabb1a711903b26e6920b84163ed6226e88af06c1df5f3a2fbeded724
SHA512f387522c42974dd5930038d55d48d7bb6c52609939843bcf7fd6e35f9a34ad95448f2ce6740c988489a75e3d64e8b7c5f5a13a81a33518c04f1bec9f479fc6fb