Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 07:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-us.mimecast.com/s/F-dVCkRV0MSkpnm4WIQOYvE?domain=whiting-turner.com
Resource
win10v2004-20230220-en
General
-
Target
https://protect-us.mimecast.com/s/F-dVCkRV0MSkpnm4WIQOYvE?domain=whiting-turner.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133244684312463866" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4124 4144 chrome.exe 84 PID 4144 wrote to memory of 4124 4144 chrome.exe 84 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 3748 4144 chrome.exe 85 PID 4144 wrote to memory of 4148 4144 chrome.exe 86 PID 4144 wrote to memory of 4148 4144 chrome.exe 86 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87 PID 4144 wrote to memory of 2992 4144 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://protect-us.mimecast.com/s/F-dVCkRV0MSkpnm4WIQOYvE?domain=whiting-turner.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff1ed9758,0x7ffff1ed9768,0x7ffff1ed97782⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,9466629096307688433,7400509214303011701,131072 /prefetch:22⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,9466629096307688433,7400509214303011701,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1816,i,9466629096307688433,7400509214303011701,131072 /prefetch:82⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1816,i,9466629096307688433,7400509214303011701,131072 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3156 --field-trial-handle=1816,i,9466629096307688433,7400509214303011701,131072 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4496 --field-trial-handle=1816,i,9466629096307688433,7400509214303011701,131072 /prefetch:12⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 --field-trial-handle=1816,i,9466629096307688433,7400509214303011701,131072 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5300 --field-trial-handle=1816,i,9466629096307688433,7400509214303011701,131072 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1816,i,9466629096307688433,7400509214303011701,131072 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\97727c61-3832-40ed-9dff-6577e999e6b4.tmp
Filesize6KB
MD58e750882fe43a9ff489a674f69f80e91
SHA15a7690d91a7f25c02d904b058161bfd14fa0a7c1
SHA256f6cf62e513e9a318731a3f0db460b82748a1f628cc8f83bf64ecbb9585b6d7ef
SHA512282d128ae2c6ca9ce37efa96485e654c947371c6158b3379b53e635a8e6819444dac1edb6709884f467b4cdb40b0d3e6cd8293b4edb812e2ec8a62d33ed3cc92
-
Filesize
648B
MD5983c41e289e44156d6202f337f18c810
SHA1f2c77c761dcf780453466a7e3c3fe258a7e8c713
SHA256b16c7f693b0b06620432fdd103e67861962ad6d21d5d2a052523f83de08263a4
SHA512139d815e1e02510fcb21a56d8cae7505abc2bd758ab627f9bb551790ace3a79b34bc26b20a1491ecd6c677711a610a62547474063a3af8953302ae66c07cce12
-
Filesize
1KB
MD50b177a5a91676e48cd83071ab9f0d97d
SHA1fdb2b0a6033afb74f05013e34aaf8ca4fbc0df95
SHA2566b7848059f90a1c4303932c0f2427160f18a166a2551c34f9a8b31d6b1c0d834
SHA512ca74c999a4879cdd78205196453081d84122f5e68bc226405027e5695581460ba994beab7663073e068aab5a1159745c8e585c7f9547bf4fd0b4ca3d5fc3a4c2
-
Filesize
1KB
MD57fcd68ca1d912d52e0e31180943f7438
SHA16f7cfd818781bc7441fad5c5ad9bcf9e2bcca926
SHA256b2323d52573122947c93e9302ebb02709665834984620dc43fddb3a71c436e8d
SHA512f1d3f720fcbebd2f178a9844eb21f74f36a739aed5a29fd260dda3887280277d031a3b8815e352de1e4aa2cdcc54dc4f991c8e7163c241814d29e9d578c51436
-
Filesize
873B
MD5e8c1dde1df833618fb0bd640a2b9a393
SHA1bf11e1ec3472bc1e2b54d10075a676b31c71f71c
SHA2562920edfee7081665e253728581c4e7ebae4e58f742244a8ca2f8fc31bba8ed1c
SHA512e4978f22fe1697b138f2e8a8417b659903d340acf68891ff2c29b96a60b2d55c1f9f095e7506d70db819d2d8a408882fcb70e573b52590243f307c79be73e485
-
Filesize
6KB
MD54277f64fbc95a32939148701809e86d5
SHA1cfd37ba7128b0cf88fa69760d53bb92866300fcc
SHA2565ef925d81a889300a491125d4331cf373c3d1e1f4b0181ba888fa52f086c1f4a
SHA512684731b75048e896e2628d37b55d35f88b0605c62e6e74265ef0c1579fd0d32f6634f6646b63837ceba018b02ca989a2d8ab47ed8e377791615b8fd05f435591
-
Filesize
6KB
MD5f624e87fa661fd0f060e7165d29f7526
SHA1be0d6ed6e37b568886ea1f4f2e2fecd4d643cfeb
SHA25634249d519bf64aed65697d81f9016e72902de96628b86e40fe1920c3b54f48b4
SHA5120accc35cd8a60b7652ddab91156d69d5980db6ecb7409cb83ba2aa480a75c6fe3036a286e174f159d8b69a27d6feeac91d5b14825fe4aeb5ac81ed6f8824351c
-
Filesize
15KB
MD5b8572be53b8533e086a3718de020c553
SHA148a2aadaf170d9cf1fe480632d8d8171f84350f0
SHA256e56122a5ede0f8e9e6c03d520a4385c210708fac83f9064b56effa511771c319
SHA512a975b2619a1f8b243f284baedb1106ca94c32b643587f0419059ce19366b5ba0290330602b80fe5f313d13a32a5a37ca7eb081b10d21ba9373fdcaa44b5b03d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\af062d52-3c4b-4c3e-8fe8-c2d7203b1959.tmp
Filesize15KB
MD55352b1c327f00e64ead07cacb974042e
SHA19eb267306b23011b86e933a6a48ac542d305f4d4
SHA256dbcf05f85b71379d402f244831a684cd499c98949f06ae3157d24c0ba9f76d9d
SHA512bc001f216734f5f70db1984b0f7ac0ea4a51aeea40425a0f8844e1a3c5a741b7e5fab70bd747d31c956c8cc11655966d3de6b3a7260b18139f342c118b8d3dc3
-
Filesize
144KB
MD5dfadba46dfd02a8396f55e0382e8ba93
SHA1c4ba7757bab56438b002406dd5ea179b0d637553
SHA2566e9f9ccb9431a324f6b0ff2c0608b56fbe4f119d53bd447624a0cc7c9b1483f8
SHA5121c67c43c1142af224ff65a0f5b0d27a02627d6d3b222cd47487f8b7bb2c8337bca6686829d9b665777ad4c08fd2cab6cbf37fbab4617f8c0601fc3ddf2671bab
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd