Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 18:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://greatcaptchahere.top
Resource
win10v2004-20230220-en
General
-
Target
http://greatcaptchahere.top
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133238101723035023" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 1380 4888 chrome.exe 85 PID 4888 wrote to memory of 1380 4888 chrome.exe 85 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 4704 4888 chrome.exe 86 PID 4888 wrote to memory of 1724 4888 chrome.exe 87 PID 4888 wrote to memory of 1724 4888 chrome.exe 87 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88 PID 4888 wrote to memory of 1456 4888 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://greatcaptchahere.top1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8b949758,0x7ffd8b949768,0x7ffd8b9497782⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1776,i,4547985099151293043,13924216852335201319,131072 /prefetch:22⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1776,i,4547985099151293043,13924216852335201319,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1296 --field-trial-handle=1776,i,4547985099151293043,13924216852335201319,131072 /prefetch:82⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1776,i,4547985099151293043,13924216852335201319,131072 /prefetch:12⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3132 --field-trial-handle=1776,i,4547985099151293043,13924216852335201319,131072 /prefetch:12⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4772 --field-trial-handle=1776,i,4547985099151293043,13924216852335201319,131072 /prefetch:12⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1776,i,4547985099151293043,13924216852335201319,131072 /prefetch:82⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1776,i,4547985099151293043,13924216852335201319,131072 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2756 --field-trial-handle=1776,i,4547985099151293043,13924216852335201319,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4456
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5d27a6f420498d22814f9d0d71fb015e0
SHA142b8638dd1d92db37fec85d5c0c1466c01d7f014
SHA256af4f5838af21ef4cb6a17c50232555eb9892792a9d58e064cc52cb4a733ce909
SHA51219db2fd1e61e8d598db98977535f9ba6c7f8a123a05ff3350dc09ad3208325a591735e3f7a47504c7286d3f3b3491b6b635be8bbd92873ec465ff0118fcfae52
-
Filesize
5KB
MD57c9a3e8233903bca482ff01f5d795f9c
SHA1f76d9ade2a07559af2c742c93f27fc027f5a48a8
SHA256aa2bdba522a29f2e4e7e5c2ecaede09238924a606835dcfa5dc3a4ade5dcf59b
SHA512cb5e587c3e772fe79f13951c4251ee7992d3bd16c4111a2595d5c45620df6c0b3a006c55e09771b70cc922a4580a7f0344f27ae18ecbac33a805600e9a9f8e38
-
Filesize
5KB
MD5465c5077697b4f2b0a61030bd7b3cac4
SHA12cbb2ad6df9d0fa61e7bd5b28c83c82d2b87fedd
SHA2568ba970c64f74e7d0e311488ef1a5c936a7fba3d38963fcbebc9953e2166aef22
SHA5127255ed59fb8a6f670b54c050561c053066587b319780a5db0f62fbe459808b40daa8fb95c626aa8deec7c289fefcd4e2c425e61fbafe49307022f5ef9ed521e1
-
Filesize
143KB
MD5e1880db4d011d679b910e1fb281a8193
SHA16d093c31625edce256023a490a13bd7a552c872f
SHA256fcf30486e8f2974ccfd5f84f80dc92d1c2a2c298fe45afa2f89fc353a469ccb6
SHA512285079be6d76f3b9937eebd5c648256b8376a0978932bc6001285b85d8305b8c223d90381e7b77dd7da7c608c981030ab8cca99ca00e4329b30365025978d429
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd