Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 18:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://marin.moe
Resource
win10v2004-20230220-en
General
-
Target
http://marin.moe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133245092004775249" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2275444769-3691835758-4097679484-1000\{686B9B66-3B01-40A8-A9BA-2E57786A2740} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: 33 4168 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4168 AUDIODG.EXE Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4136 2512 chrome.exe 84 PID 2512 wrote to memory of 4136 2512 chrome.exe 84 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 1020 2512 chrome.exe 85 PID 2512 wrote to memory of 2976 2512 chrome.exe 86 PID 2512 wrote to memory of 2976 2512 chrome.exe 86 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87 PID 2512 wrote to memory of 760 2512 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://marin.moe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffbb7ad9758,0x7ffbb7ad9768,0x7ffbb7ad97782⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:22⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:82⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:12⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4576 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4920 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:82⤵
- Modifies registry class
PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5344 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3952 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 --field-trial-handle=1828,i,2996547130722734979,9845030433166557111,131072 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4924
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x508 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:4168
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD53c39898a19eb484aad443c7bc8daa6c0
SHA14b63a45e5e743e5411b04e6b879bd6ceb0be7dc6
SHA256c6e62a164c53ffba8b604c0331f331c136f597054ae7b1becb4b12d6e2fa16a1
SHA512405bcef3eec50d78d86e1e0f78c6c3d54cad8cb9952a067b067720cba1f15c6fa501286dc0fe69a11e6de85108ede66207591ce77a03829214a8a64b169257c2
-
Filesize
538B
MD5afa83eac00f849b29101a4bb1734b27f
SHA17c9433ce01421486a066965cf15b0f3edfc4a85c
SHA25620c2e19f202b79c70d9743551e6b427822794a9913af9fff5096daeb1971b4a1
SHA51212eadd90b36db1d8a866c01701d37bbee2438e5be801552f922b549e70e0a994eea2d7d06609833595f2dc2074dc074cc9865fa2fc47807c2f503d76e1b3f766
-
Filesize
6KB
MD525780ab87cc9882891bc732f92e8fd3c
SHA19196ac6ab42dbe949d585ed4c8e08180006d9b9f
SHA256f975c75decd86c218ff481558dc2e30fb4c615b74e89b3d6a548b73d7c0a392c
SHA512aa5e70cda496fbec190c9d637148c04a662410027bd0352dc3b9f93ef72128e10932ab7d8b52c8eccfbcebb539399524434f873682eae89f651178734a6af729
-
Filesize
6KB
MD5f6b224537578154bc5316393eb5469ca
SHA1089c10c22d38e6c9c32ad64de049ccd705150502
SHA2562a8f241a33f312eb04aaec88ef887115754fbab6e3ef2a25553e2b4393109404
SHA5129d5444c91f11d29d67b53fac8734caac038a1a1cf51131fd89bb7f55ae1b713dab6fa21164e11fd5e25bdd29641beac2d44de8300b8386781d8e3a5ab16eaeb2
-
Filesize
15KB
MD5a7138a0b41d6aee85dbdff33faa2bdfc
SHA1442b2eae89a70f60b9212fc379a746348974c01e
SHA256f034cc1ecebb5b6e18b6a2488a21b8149b04e7535e33c6c29831e6bff4775d8b
SHA512377720bb593daafdab62704dba36e21a386880694660b468b48d73d745d73a3aa76be2626d1a57940b03ec012b408b0bbb37b508a97546143725adce6107f20d
-
Filesize
144KB
MD51226c12f8912a949aefddb306dab2d6b
SHA1bfef992a2d5c8b39e13e66177b64ce328b847794
SHA25605dd30458083e7f4d3e388cebe8a4170e424ace153a65db7b62fdd3a27b8c2d5
SHA51285d7b476fc19685f8978ecf5ed227e59d399a6a27a840c6319b5d7d5f89203a41f0947b625432a8f3003e50968c6f4224d48c0ffc6765afe2922ae6902d5ce85
-
Filesize
101KB
MD53982141bacdc056c85bdcab70f971bf4
SHA14682a059dbdda52669ff428d3ec455a9d8192a87
SHA256db2006388cb10a5bb4bf05d6270035f182fe1be85fe875ec5da655ac4aeba0de
SHA51202c5f1bcf091184ef4d2219f4e3e7b1c71300a1a36cd0307785c001afa84c7a996d238a3df34c5058b76030c5cce6884b80248e3f77d2c3f23d40eb1899ab2d2
-
Filesize
101KB
MD5b93347bd88dd1c85bad263ee18785f70
SHA194123014a25ba15d6ba46a267a7108bb5f48cf39
SHA25691024c7937667e8bd0e7dd5c3901854dec9223828204b65f10a064c2a25bec86
SHA5121b9006706cfbc6ea784da9861a0996785d1a625cb8985c27c778aaaf9398b0df9f40f70462306a9b2323eaed37b0555d9a1dd269ddabe4ca4df88a726607596e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd