Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
83s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 14:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://wisconsinretirementsystem.com
Resource
win10v2004-20230220-en
General
-
Target
http://wisconsinretirementsystem.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133234547123125016" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1324 chrome.exe 1324 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe Token: SeShutdownPrivilege 1324 chrome.exe Token: SeCreatePagefilePrivilege 1324 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe 1324 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1324 wrote to memory of 392 1324 chrome.exe 86 PID 1324 wrote to memory of 392 1324 chrome.exe 86 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 1084 1324 chrome.exe 87 PID 1324 wrote to memory of 4328 1324 chrome.exe 88 PID 1324 wrote to memory of 4328 1324 chrome.exe 88 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89 PID 1324 wrote to memory of 4272 1324 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://wisconsinretirementsystem.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd8,0x100,0x104,0xe4,0x108,0x7ffdac1d9758,0x7ffdac1d9768,0x7ffdac1d97782⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1812,i,1724103986141477774,12745423744499136153,131072 /prefetch:22⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,1724103986141477774,12745423744499136153,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1812,i,1724103986141477774,12745423744499136153,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1812,i,1724103986141477774,12745423744499136153,131072 /prefetch:12⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1812,i,1724103986141477774,12745423744499136153,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1812,i,1724103986141477774,12745423744499136153,131072 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5092 --field-trial-handle=1812,i,1724103986141477774,12745423744499136153,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1812,i,1724103986141477774,12745423744499136153,131072 /prefetch:82⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5148 --field-trial-handle=1812,i,1724103986141477774,12745423744499136153,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD52f9a405601235cbf5cfa2f24e90de87a
SHA1ab6a2aae56084e8bf678a58fae6d04bd0e67a523
SHA256de391f895c28f9396cc31b691096ae8809aa8e5311654ec4980e5e2ce8f4671f
SHA51291d8568bbb1db292017b3fd6592cf37451ae15cefc06b03a0e2b559430640d96811d1139dbf66ed38a8284aaed791304ff741d0f2f315c149e6e1e5c24f9bfc9
-
Filesize
144B
MD589be600668aa66bcb0ef1a1c1517499f
SHA1a88731b6436848d3e368621b9b338dbb473d89c5
SHA256f861c3bf81e64bae9307a79917e2609d18e906dafb2ffeb9feb2d3dd0c5d90a5
SHA512d54cda2fb1044c20eba6e90c3c5d3018d54718f35fa515abcbb283d7ad6fc8550e170cb14ee4e4f039282e86c87c105d58a716d8c176c87bd81c58f3dd5e0a73
-
Filesize
3KB
MD57c27c6082d6dbafa74916b2bea459c05
SHA1511ae8a38406884e3562f0ab1b11a576127db38a
SHA256fb4dd0ada6ea6edf37e620a2d1ac37e9c4c6b2198aedd334a528b2abfd88cd88
SHA5129e5e673bf55a43c2ef006b2464c09fd41ed8a417c700a05546054587d852c99e93d2b1138f410e856d759c7aecd22b6eb3133d156505b588f233cdb663afb03e
-
Filesize
1KB
MD5b3001854dc531aec4e4944fd5b34b01e
SHA15eea57cb97cbc53d32cbd39ad9436a082b686504
SHA2566befbe653cf9c6c2ea46c830b950ed6eebe52e8ed71b3d8756b126a4f05f800c
SHA51269a709a0f1d0aa50c4e15dadb633027fb0c0b311f49f170e4c7b2ad03d90f0fd18349a7ab7f6f022e7826b68910be05b94ac34cac255fa40ad0746ce3fc0200d
-
Filesize
6KB
MD558af93169add055aeb7c052616e1c191
SHA1e457535da52e9a967757656eb4601bfc6d601153
SHA256b0d23b8579d322af6d9750dbb7dec6c0d999f9d4724ec9aea5e0b9b60d18a3b2
SHA5126a840d63ea4ded5fe37a7a70bcda58c6db7859091a64b5dc52413101832a13a912e989a755840e62663e7f2ebe3b12293e7d5d20a60ca24d6fbd045e9e2c32f3
-
Filesize
6KB
MD5d9f28b22a1f1a149bb90651c40b2d307
SHA12ab9131bd364b870bdd86df433ad55e10ebdf90d
SHA256e184912c90bbc24982ce2f4a4c906dc2e91c9305d5f6c167f5fdd60e7cbcf093
SHA512cfb6575721fa4532ecee474a3436cf98ac3963ef769d063c9496a91b13ed002833cc11ed8e5820cb5e764e199040fb9c595bbb7345dbb2a50c41c0f617025c09
-
Filesize
15KB
MD5503c77cbf540a5737ec92dc07df4cf70
SHA1e3677e7092873da2939305ec49df4b55ccef7930
SHA2561dc0263bfec0347f70c6359731c3f22e5028bf13bbf0de4e1292dcaa9499631d
SHA512333354c19c574da2b375189c59143bdaef27c8325d4dd1f82d49c52baab5e5e06e0966dc9a9f77140b25a03d2295d272f4af629630574867b6079ca6711608cd
-
Filesize
142KB
MD53f80acf4391cf750b559c50454d52fb6
SHA144528c462fb87af18872dc823e75dd54a6ee2570
SHA25651caa2c7e8da2247bebe97c396b2aa93cd7d619faacaf84f0f8c9f8fef07cedf
SHA5121489978f124edf1a5ebfee9fdc592d5bf3d01f2f988dc9fad9cb82b29dca5d67cc3bbc9c539d09b0f3f2b0568125ed5e9553cb1d4e42a1efde65951670f4a688
-
Filesize
142KB
MD5cc6ec227ad1eb338ef24a2b8e848c211
SHA1988feb3474a92f2c6a43d734fe4b4d22ea199ced
SHA256ec5c09a6c071dd46975b87862ed62ebc0adddead8f850d6f36ac609e2f6f8e4e
SHA5122667b450195eae08f8a5541f32ec7e83f55379dae01d8654ea5311215d90b77143aa7c4e54e8e1caa12ecd61596f35b19a47110cec81035ca9c9bd901a7f348d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd