Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2023, 15:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://giraffeautomotive.com.au/man.php
Resource
win10v2004-20230220-en
General
-
Target
http://giraffeautomotive.com.au/man.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133235403322274774" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 4544 chrome.exe 4544 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1736 2672 chrome.exe 87 PID 2672 wrote to memory of 1736 2672 chrome.exe 87 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 3412 2672 chrome.exe 88 PID 2672 wrote to memory of 4640 2672 chrome.exe 89 PID 2672 wrote to memory of 4640 2672 chrome.exe 89 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90 PID 2672 wrote to memory of 1584 2672 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://giraffeautomotive.com.au/man.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff865aa9758,0x7ff865aa9768,0x7ff865aa97782⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:22⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:82⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:12⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:12⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:82⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4848 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3316 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:12⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4528 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:12⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1800,i,3047439117665261820,12937402349430630377,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816B
MD56804fbdf6f8e232c279644a35c7fd2d6
SHA1a334ad520404c3f07ce5f3b1439ca9ff0811b122
SHA2562917d991e301d091ca82e12a92692c1d2e302b5a6534ffe6db0df2d740025f9b
SHA5126a72be87001903eba38e1e61a4ef90d58501d05103e0f26fcbb54e280221ed66a93a42f8860bf02d2b0a5929a976d5d31dcc394f02cd7d1cb35d5aeb34c92575
-
Filesize
1KB
MD59be3c73a973875d4677b70ca934e7763
SHA1b51e22f477d20b53329a9fe73721f0851463f38a
SHA256c4f1f0468b020d5724b0c8aefa0f136185b2d29b0cef9aca4ad6ea356182ca7b
SHA5122ac841709404e937b26a07ae84e58f2f72ae31c3fc26a8ba07f827cdc126cd09bd399562b7e8edc4796d15bb3aeeb914492343b04f82319a6c48288c71c18f8c
-
Filesize
2KB
MD5c444393faf314ac602d12c872f758387
SHA132c875e951a4cb855d77ddd9523735a9162ba789
SHA25683609bd8d7e43adbb2a5e3a43196a0eecd48835a33df8b69687afbb8ec77b89d
SHA512c115df8f8d2854a55d67c0949aa13af8d68ee702048734ba902e376de01ccc41d985629616d726c20d387d331bcc3be2fbf4058b98d95c5e9e89367d60772389
-
Filesize
706B
MD5ea80b23ddb98fa7e7d73ccc5a8198f13
SHA16e027fa7b3eecee9438f9ad42caed6d25b7b7356
SHA2566f1c22f671501668c4f93d51718960dad12785d0f77da926e9af8d6deb53da18
SHA5129ae7f0e847264a078e425c1325c97b12e493ed3e0b195862e1728ba9073ca013e968f9fc57f22778e16ad5d7fcaf8562d669099099dae9d0766f23052bd7db30
-
Filesize
706B
MD581c6deb428bba06ac0bef391938cdccd
SHA1b831165ef9ca9aa020a8c48d3047dd9613c30a00
SHA256463dbe8a37f16bf5935fcb76f079530f5d6acb70b916f80cf63b63ae56b435b5
SHA512e13e58681cc03f812ef0428c0f82bd7318be63f6ce95e42009116b5e47be29281584cad6365a24b2f066e51e10f53fab961e0a86ae098d060947f9240d3eae86
-
Filesize
5KB
MD54562edbbe597e6c1ff1e730145766987
SHA1947d405ba1770ea4e71a24333f695b2ebfe47d6f
SHA25647782b3c00574148bad6eb3d53225b83e46758671a4ee33c6847d50378a4905b
SHA512119b561cd8b5590536e3765393c5efd3036dfaf1c6de0e950a4b21f1869c6e84a8ec1b08dba913d324f28193971d635ad95a1f3cf48f5b9f2fd5863f1584c937
-
Filesize
5KB
MD5c13e2637d089d9f7f0595f9bc47f33ca
SHA1d3b73507b08928eb3cee6204e71b2029578d1bec
SHA256f45df03de960cac38da6b0f9be7d0c98245d50f2df3d664be3ee58ad1c8dad38
SHA512672326b07118ed616876bd82c94bf5e2301fd59c84ce710a39c04c55a3b9c6eaeb380c800190141b09818caa0bb1e78f56230a929a4a4cc2275837fb758f2ce4
-
Filesize
5KB
MD529eb8947fa5635f1e1b53870b348aef6
SHA19dd35c0b6b9775364d5b3d8ae1cdf8596230b71d
SHA256340d22d2f1d6e40f818f17dd038f00f2c88278884c6d8d4490a3d860270992a3
SHA512bc830dfb8bb706922174ed1ab3ccf724614475198064a15bb7ae15d44d4193338895ca13f1d46a2fab20f995170d1451d520f09bc4464e2a413eec7e11031eba
-
Filesize
143KB
MD56f01cd1c71b4c090ad999a7384ce5c38
SHA116d391bf3e09b752951898ad38c1d5d041b6f752
SHA2567e8e088b5406e72bd3436d21ba2398d3e15ce9c2d507c84e1850ffe003e079df
SHA512ecbd45b7cd9e1e70bb71592a7ba8685d0ba610f25eb876961da2980156f4f3ff96f4532e68d2fb589f4a7aae9db48d3182f2af388fde1f3daf58aa77e1334c5b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd