Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
102825.WGBT4D3S9ITG8KF842I.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
102825.WGBT4D3S9ITG8KF842I.html
Resource
win10v2004-20230220-en
General
-
Target
102825.WGBT4D3S9ITG8KF842I.html
-
Size
6KB
-
MD5
19e857e04020e37ded67bad5e037a7ad
-
SHA1
a85702b49605bebf327a382032980a2ec9e9f96c
-
SHA256
3d1e3cae10cd2c72b134fe2348da5368e095ff4663c929ad2a96cf26f9ab8f58
-
SHA512
ccf52506865ca55b70233a28f9179a1b98b344a0d63f30f8ef4e0a2559e7b82ee2e3219685b45a99fbcb29acf0408ccaaaf788c2376cbf421bf62037c9c2c358
-
SSDEEP
192:Ek+0TTZ0ZTAL++pEdULXzzhAL2LHTiuOrr3YrMDi:7TdOTj+4L4HT2vFi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133226808143545073" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1284 chrome.exe 1284 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1284 chrome.exe 1284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe Token: SeShutdownPrivilege 1284 chrome.exe Token: SeCreatePagefilePrivilege 1284 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe 1284 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 4364 1284 chrome.exe 84 PID 1284 wrote to memory of 4364 1284 chrome.exe 84 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 1444 1284 chrome.exe 85 PID 1284 wrote to memory of 116 1284 chrome.exe 86 PID 1284 wrote to memory of 116 1284 chrome.exe 86 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87 PID 1284 wrote to memory of 1336 1284 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\102825.WGBT4D3S9ITG8KF842I.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffd48ab9758,0x7ffd48ab9768,0x7ffd48ab97782⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,376912343421668332,14026526721590038162,131072 /prefetch:22⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,376912343421668332,14026526721590038162,131072 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1812,i,376912343421668332,14026526721590038162,131072 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3228 --field-trial-handle=1812,i,376912343421668332,14026526721590038162,131072 /prefetch:12⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1812,i,376912343421668332,14026526721590038162,131072 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1812,i,376912343421668332,14026526721590038162,131072 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4880 --field-trial-handle=1812,i,376912343421668332,14026526721590038162,131072 /prefetch:82⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1812,i,376912343421668332,14026526721590038162,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5a2fe49ba53274514e8431a68f99604b2
SHA1141100f2fc463b648651f859457893d98a15ba91
SHA25631c835de5aa040bf3798f1105e09ffbba7e0e38e86bf8ae3a3f4a13d249f534b
SHA512299eb6e21e08bbf33b89f8741b47c8a32d38e253eaba6b23bb1a05236ce30377d277e9aec0c2f8ba516dc15fc53b4d5e397125b86f0296f69f12f9ac4b201bd2
-
Filesize
6KB
MD51631c673d98ee39ac101b2094deb622f
SHA1d9e3599bf9261a8704be0d4ff838c1bd52139883
SHA25617cc331f3bf507334828fcd3dc46ca374f807697bf63998796dda1bc5d729dd8
SHA5127e041da6a5c7fee1575f1701f7fe7c40d4c2a4c31fb1c41df26e8d395ceb03fd1d76a07c1f4686f942bda81b8870e3231bc4cd8c33c41624cdb1191e8ac0aa3c
-
Filesize
6KB
MD558d0a78328b1d8914f2bb16b31243bcd
SHA124d7bebaf1133a74f024299a13b32ab5b8b130c1
SHA2569b263dbc20b7c6f6aaf0b8839989193a399159c5842c7b73a10eb09ff53841af
SHA51202dd2955510e6971a52f156612f9f6922cf2831f801f9b4527ead7038ad7b59fc987d0c5e10b09b8657c97a4182dc282329751d05ada0b9fcadf453c659c28e7
-
Filesize
15KB
MD5f14803893149b86b263681e69643f692
SHA1d93aac1b14af334b47fd15ccae0b24452e63528e
SHA25637cc2a86276b180ab33ad9fb0c2fc75be5a31444ebb39499d6e2d17e5c0e20e9
SHA512decb170df43f331695c714d5dec2ea4ba2d04a9674c762e2e4148326bdb49fd2b1f5d240541920fda86f3885021b564cc578ef8f3a3b04a6906482b2faf6a5eb
-
Filesize
143KB
MD5d291225db7c4e63a3902323bd573b4ca
SHA18920e7b610db4fd4b7538b8b97378083f59b0172
SHA256913a9119c57c3990321535fbae1ffa5ca014360836455c708134b32960b4f711
SHA512694f0f27472fe789fb88a6cd8be8bc0b8b4853b522ac614a3dcd2b91d0e81ebc5cf6d5eee168f8eed999a751b884e3fa578496c45451c7aa703212913fd90ab8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd