Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 23:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://abc.signinintoyourmicrosoftaccountonline.cloud
Resource
win10v2004-20230220-en
General
-
Target
http://abc.signinintoyourmicrosoftaccountonline.cloud
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133246073446960496" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 2640 chrome.exe 2640 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4216 4364 chrome.exe 82 PID 4364 wrote to memory of 4216 4364 chrome.exe 82 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3352 4364 chrome.exe 83 PID 4364 wrote to memory of 3680 4364 chrome.exe 84 PID 4364 wrote to memory of 3680 4364 chrome.exe 84 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85 PID 4364 wrote to memory of 3868 4364 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://abc.signinintoyourmicrosoftaccountonline.cloud1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc497a9758,0x7ffc497a9768,0x7ffc497a97782⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:22⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4484 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:12⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3348 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:82⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4792 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:12⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2792 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2788 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2828 --field-trial-handle=1796,i,5078847466087697360,4684649263776004481,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5f528d0fc880fc3a68465f1c44048602d
SHA1fc3b9f8cd77dac0c0f691ec4cc3ef58b68728239
SHA25693496b88b928a4675ec48a084c5c222c9a67646a4c304da2dd156c6d102852b4
SHA512049e0f2b7f8e3e5ec8a4ede45c67819ef3ac79c12ed909a4a2c5bdf7c7c28bef57602ceb21a4ebb9f4d7ef0442136c0d5c0463aecb621559e1399e1c1575437e
-
Filesize
5KB
MD51ba8cf05c996028fa64e8ffff98c6846
SHA155e84fe47b6851f6d22412487ab9196976264cd7
SHA256ecf9cb4e921c83e5868d21a0359944900e8a59be11157ca02c02895dcd1a87c9
SHA51286b312d88edfe779b43ae9354a4d6ccba77fb22ed152b19dcace06389bfb97e698b917d28bb4e586c455f07c654be702303de6894758943ec26d1acc2a246e6d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b7b6668d-0cfd-4270-89a8-62e8d6ccdaa1.tmp
Filesize5KB
MD5d5e05570c268fa5f410c55eaf9a044c1
SHA1a9edb9cb9c10658a840bdcd6ae3e429f187b0f29
SHA25615fb25edd4df697919a8ccf61c1dc7079ff133cae5bdb29b27baa0b58abe41bf
SHA512b7e164ab470ea6dba31cc8070c75c0380b6466456a5c6edbd06af20d1cfee1f1deb305e5cfa78628c5da9d071fd594bb871b377dfce332e8fef2e4301e47adb7
-
Filesize
145KB
MD549139549117aa83bb5ae6b1776ec0e41
SHA1ff79d5709fb8b40eb1b035caca82d8f4896da59b
SHA2565ee8f9fd987e68f5a35b19a38ec91c2ea3d7630622fab2f91187eb9bb5e6016c
SHA51261c34ffc5f003a5f2b3aef8712e9b2b4dc6903193281dd1e99b91e66702b00d720a1adb1afd49fa70796f913b22462054492a88544c3fe45b569966d6511c303
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd