Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
504s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 12:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-us.mimecast.com/s/z8AfC827DYSX32R1vU1S6Ed?domain=eastus2r-notifyp.svc.ms
Resource
win10v2004-20230221-en
General
-
Target
https://protect-us.mimecast.com/s/z8AfC827DYSX32R1vU1S6Ed?domain=eastus2r-notifyp.svc.ms
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133232738815261497" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 464 chrome.exe 464 chrome.exe 2508 chrome.exe 2508 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 4112 464 chrome.exe 86 PID 464 wrote to memory of 4112 464 chrome.exe 86 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 4428 464 chrome.exe 87 PID 464 wrote to memory of 2124 464 chrome.exe 88 PID 464 wrote to memory of 2124 464 chrome.exe 88 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89 PID 464 wrote to memory of 3740 464 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://protect-us.mimecast.com/s/z8AfC827DYSX32R1vU1S6Ed?domain=eastus2r-notifyp.svc.ms1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd044c9758,0x7ffd044c9768,0x7ffd044c97782⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1836,i,5320136246409071225,387818328422318961,131072 /prefetch:22⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1836,i,5320136246409071225,387818328422318961,131072 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1836,i,5320136246409071225,387818328422318961,131072 /prefetch:82⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3240 --field-trial-handle=1836,i,5320136246409071225,387818328422318961,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3216 --field-trial-handle=1836,i,5320136246409071225,387818328422318961,131072 /prefetch:12⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4552 --field-trial-handle=1836,i,5320136246409071225,387818328422318961,131072 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3232 --field-trial-handle=1836,i,5320136246409071225,387818328422318961,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5064 --field-trial-handle=1836,i,5320136246409071225,387818328422318961,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1836,i,5320136246409071225,387818328422318961,131072 /prefetch:82⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2876 --field-trial-handle=1836,i,5320136246409071225,387818328422318961,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5d885c308f353a8cfb8c032c1bf91a081
SHA179b55527113ca31a20e060ad8a46dfaba9c75a41
SHA256626d6a0897cd331ef66618ac7532f77cc188d017147d554df60ea9ea5889547a
SHA51205bf584155a00cac3169a0357b82c5f3999db89ed65d69d988191394340bdfbd729db53a46eacd87a315b743fcecb3cace4d39fcd0852f7b81c1db3d5c9e8d87
-
Filesize
2KB
MD567f491594a4091ffdeaa52774e2bcdaf
SHA1ece466a2b78e0f7e261b45d5b5f1d507fe5f7da5
SHA25674cd8bbb2ae6868ff14873548177586ab8f2f567f95d8f7e45d53ef17f6e8782
SHA5128637cbc89681130ff5f4e02ac6185bc31fd6153a79d7b20dce124f6b03b441d1a2fe9fe58eb9fd61099b035d2a98d0796be6b56e30965291172ac4cf76924393
-
Filesize
874B
MD5d43cbab68724c122daa5d7b97376cd02
SHA11ac6e2022dd2b3991cc749171b1099c45b5ecd35
SHA256d1d805d214f94ab23bb385805bcbe84ef927652c69a8204b58d899479975f85e
SHA512786092859bcf24e7c8cc1aad68b70c66acfe89368854a1ae6e6e5a7701bbd00632083529f0fcd11a561392808839ed1abc9b048fc1baf41e2e6597f55d619853
-
Filesize
6KB
MD57a69ff7541c2d4c55c7cc57fc63c6b00
SHA14dc3582952654718711302eb909cc976ff4d2838
SHA256b69c530f678d58fa2f0217b0504c11d8ebc3ae9ccb68e860eff20b666327732c
SHA512e0dc9b1f3c1a75c5df2db7e6849befa7c01ad62d7aa120573ac6d35aac3fbb879b0e9ebb75099780408f0823d67727d91acad6ef4e2f8888ce0e89aee0d7dc84
-
Filesize
6KB
MD5e23ba5a1759d6d0b3272411edaa04e2d
SHA12e41579fa1a6f028fb02fcb9b75565366fb3ad18
SHA2561f4b39fbf112ff4e5db5c2f87b1f79f95e4abf15b5e4d22b169e884bd2b21df2
SHA512a3f27b8bf076608e031c55c6f3fe03e6b3123719a49ce6c1a2541fca23a90c02163770553a38b9619e5f74207169d7533c7b66cc8fe81d471ceb7e2b481ee3c3
-
Filesize
15KB
MD5357e710f2fb63b2e7b8cbc852bef993d
SHA1e8dcd15f1f5b0eb6effb9c3c85773072e2d0c154
SHA256f9e7a8777361d1232ef77464ad85f310e45759e08586786813e29f6d67e8dde8
SHA51282cee2f8e7068a87e6345b2664be929d31e13be78965240a9549517c842c0e062d57087a89fb6a040dc58db45f7ccf2efebd859e11bd778b2ddd37e1049d406a
-
Filesize
144KB
MD5634fb97d1ad7d5ace3a1e4ddcfc49c71
SHA170dcd667cb3668eae1852c0c32dbb4d209d362c3
SHA256dc33e566c14b376c78ef2886878b498af5f2d47b6039e75303842e5e79e9c677
SHA5127c5be0a269d3679412d8a8552ece55d19d19be557cd105023be8a2768ec3d6c9c7d5436914f2e1a8f13c0a4a0edbaa0e0da07ca0304ae309be5352dd9c26b8a8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd