Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2023, 18:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/uc?export=download&id=1h6Im3_pOiCHU_RQFGeSlRNUcTNdixCZK&vero
Resource
win10v2004-20230220-en
General
-
Target
https://docs.google.com/uc?export=download&id=1h6Im3_pOiCHU_RQFGeSlRNUcTNdixCZK&vero
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240694363032039" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4300 wrote to memory of 4364 4300 chrome.exe 86 PID 4300 wrote to memory of 4364 4300 chrome.exe 86 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3168 4300 chrome.exe 87 PID 4300 wrote to memory of 3836 4300 chrome.exe 88 PID 4300 wrote to memory of 3836 4300 chrome.exe 88 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89 PID 4300 wrote to memory of 3428 4300 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://docs.google.com/uc?export=download&id=1h6Im3_pOiCHU_RQFGeSlRNUcTNdixCZK&vero1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc29de9758,0x7ffc29de9768,0x7ffc29de97782⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1792,i,17554723448821238216,10128172809606867406,131072 /prefetch:22⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1792,i,17554723448821238216,10128172809606867406,131072 /prefetch:82⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1792,i,17554723448821238216,10128172809606867406,131072 /prefetch:82⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1792,i,17554723448821238216,10128172809606867406,131072 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1792,i,17554723448821238216,10128172809606867406,131072 /prefetch:12⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1792,i,17554723448821238216,10128172809606867406,131072 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1792,i,17554723448821238216,10128172809606867406,131072 /prefetch:82⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1792,i,17554723448821238216,10128172809606867406,131072 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4916 --field-trial-handle=1792,i,17554723448821238216,10128172809606867406,131072 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cf26c59bcc7d0fd0a856f162b9f18dfb
SHA1d78753227d268d45da1efc41208852ad6d7626bd
SHA256011ea0a42fd4a0aee368b6f8ba1c566ac50adb90c44fdc56244ea9117c104682
SHA5120f8050d28d162b49e73099036cb16f898fc93af34a70a1528c9a15568f795a5c37e96f78b6dabed5f921122cbffeec2a58dfe08295103dfbc488eda3f44fa1a7
-
Filesize
706B
MD51b5e4aae03a4a5310bd2ff37ad8e6f58
SHA123435fc50cc8f04d4960e38cc79f96ca20fd452d
SHA2561d3cbd7b4a727227c4499eec0b90f3d6e8f953657b190b3cdbb4d38258eb585a
SHA512e5452032c8e48dd5105e4665c330fa8e484ae6b16929310717a930dd6801b1d2d3e4fdb81876158895bb573e683be812b974bae370927b3578e60021a3fdfbdb
-
Filesize
5KB
MD532234338ed38d8ec7a3f0777a1b574a8
SHA17c42e02387aa6900d937d4873d1a7fa81080ffa7
SHA256faa82ab8c60c19e8de633281c683de4202376137fc90cf5d33926c38b2c8a559
SHA51237c1ddfe8b986fb0dcca92cc3673a51852ec444301f9384d820f9f2b14a763b548218665447b289951fbe74041a7d87ccb78499e162f2fa114f25ccfd82a0c74
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
145KB
MD56a00e4fe342a430ebeb1e6eae9c773b1
SHA14c28c23c77c13d51b3d2923de3fc3cee9434a31b
SHA25606a5adf09f71a3dc0f9ff2c414987ef42551aa3d871a222b4ca43261f00bef29
SHA512b777b87f0cdd061b616085aabc20e4d711b1c493f15e7d991a43968d8c660149c846993460b2168a24a91424fffb1998e1c7d6d47707c5bf5dde5ba34cab2e57
-
Filesize
145KB
MD51081643cb6c80a29d48f3fb50e97ea09
SHA1f8d5cbb2c52367571bd1ae21bfe22245c5a6ed34
SHA256d454c44b4ce6ba8797bbe4612de0a183d769f7808f3a13f98e66f0dee09ab159
SHA512204e665bd43573a8da2f848ec44eaeea07f2b4b2fa3f82c2a3aba1f958e43839582020ad2932955ab413b254fbddced20ee5b76dfd7f0a842d7a8ef76fc0bff2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd