Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 14:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.evernote.com/shard/s603/sh/b621b1d8-acf9-27a2-f32b-427a282f78aa/nZjkiLP3hMMpFpiTUCkps_2ZJJpS5Fg5wfw7QfdoV1Vi2MmaxcX8tVsA3w
Resource
win10v2004-20230220-en
General
-
Target
https://www.evernote.com/shard/s603/sh/b621b1d8-acf9-27a2-f32b-427a282f78aa/nZjkiLP3hMMpFpiTUCkps_2ZJJpS5Fg5wfw7QfdoV1Vi2MmaxcX8tVsA3w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133232776897990618" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 4624 chrome.exe 4624 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4340 1528 chrome.exe 86 PID 1528 wrote to memory of 4340 1528 chrome.exe 86 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 3996 1528 chrome.exe 87 PID 1528 wrote to memory of 2500 1528 chrome.exe 88 PID 1528 wrote to memory of 2500 1528 chrome.exe 88 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89 PID 1528 wrote to memory of 4736 1528 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.evernote.com/shard/s603/sh/b621b1d8-acf9-27a2-f32b-427a282f78aa/nZjkiLP3hMMpFpiTUCkps_2ZJJpS5Fg5wfw7QfdoV1Vi2MmaxcX8tVsA3w1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xdc,0xe0,0xe4,0xd8,0x108,0x7ffb0b619758,0x7ffb0b619768,0x7ffb0b6197782⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1816,i,5764365441962095531,8819737873083576745,131072 /prefetch:22⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,5764365441962095531,8819737873083576745,131072 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1816,i,5764365441962095531,8819737873083576745,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1816,i,5764365441962095531,8819737873083576745,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1816,i,5764365441962095531,8819737873083576745,131072 /prefetch:12⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1816,i,5764365441962095531,8819737873083576745,131072 /prefetch:82⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1816,i,5764365441962095531,8819737873083576745,131072 /prefetch:82⤵PID:724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3716 --field-trial-handle=1816,i,5764365441962095531,8819737873083576745,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1816,i,5764365441962095531,8819737873083576745,131072 /prefetch:82⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD558ca2e6b0857a2b0c67f35d3119f2f7f
SHA16524aad5fde6b06075a45d0b827114c113707309
SHA2562e9d4525c8131a97417b0c5676cc966d81e74d15a7ccbe2414048c8f6369e6d5
SHA512bfe1a00a644aca648295698a45f8862305c6082d479501a3904fda49f7fb4b52cc4aa8c1e99e940677da592dedb23c6aabac83903f6659f25af0da3661a71700
-
Filesize
1KB
MD5b1565c56a066e899a52d9703d4d79447
SHA19dfe3597b4b16f949a57b4625921774921b1ed37
SHA256d33871d4b1359d238966fb00104faf55a21d2fdc19f75a4991600157f95b1818
SHA5125649ab17f09a1724fa5c3d51938ab977cb18640a1076f5442fba16385b42d608e1acc2b7c7324f6eb868730007a225de27de801f7fda01269dc630e68b668e25
-
Filesize
873B
MD5cffae4de976f0666e4d368ea3642ef0a
SHA1f4e81de947b420dc3a19af8a78870abb01f3ca9a
SHA256f238f2b2fd41496fc52ab3fb3c8d885a2282cc2154f9d3b6c90032a8328a29be
SHA512d49466234653b48ec67e1f99ef03db887414e320253f44855c7304183719767f8fed8ff3bcb862365925f5a03e2d73c0cf510f1cbb4468035e6f14b7b9e00871
-
Filesize
5KB
MD50e1222174328bf752b46aa123af26d34
SHA14d8e3f15e514095ac170b71daa8a993ae4fd0d8c
SHA256a951ac767bc92f60504ec9269c8f5a439926fe217dace6d5e24dca83ee2fcbdb
SHA512f375f7eb39df9a9be48ca952b6b546057a6d71dffd6aad83fce76fd9685b0f9b0e4efac4c5a4276e67020c35d1604e3cea5d280713ae8b33159807b139e6068f
-
Filesize
5KB
MD5ce5e17358627b7934aaf8ec5193a73d5
SHA1d79f64a75aeb2d9bac20fc226d24d94408eb6356
SHA2560044e225f6ac5b5aa330ab6aad1cb9a15d7605c7a470c8bef051c50347b9bfa9
SHA512f802d107563a367504bef11f729fc37285def16d7aea91f9f85e00fb9f272f70d90b6ff655da4bd642a8612add8ed7a1e9c9df8a2228b6535d5da16ef186a05f
-
Filesize
5KB
MD574978b04dfac90006d7e3dd93f9c03b7
SHA18a9f6fbe1d8d93080a171a2ccc9cd27d9c9b6f3f
SHA256fe8315d5514c6af37fc109b2a25384d8e8e87d7d063ab5b9958fe2de1ceb25b9
SHA512ea8c96da7e0b12c355f1f655ee2c8a156bf6069c6bcbc1a518b391b38cfb10dc2ee1282b91a529df428d09f57295cdc1971cd75ecb2ab8efa11d63b8d636669b
-
Filesize
144KB
MD5e1499169d2d82783936c730627576419
SHA17a5ec5426e3a59a69cf397f49a72354042fd71e8
SHA2561935ca1463a9ac33a1ee72d2713aeeeec2c8a03121ccce600c123972ed0467a8
SHA51215a622065341024acd5b34052492b3aa42e964cb227af53b27048f445235fb79af309c266cac992282f90e3b190d2fd3353ba94f81b3532f6450b80e503885b9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd