Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1688s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2023, 17:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://raw.githubusercontent.com
Resource
win10v2004-20230220-en
General
-
Target
http://raw.githubusercontent.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133246799824004252" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 3868 chrome.exe 3868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 4360 4540 chrome.exe 82 PID 4540 wrote to memory of 4360 4540 chrome.exe 82 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1152 4540 chrome.exe 83 PID 4540 wrote to memory of 1000 4540 chrome.exe 84 PID 4540 wrote to memory of 1000 4540 chrome.exe 84 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86 PID 4540 wrote to memory of 3620 4540 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://raw.githubusercontent.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff864bc9758,0x7ff864bc9768,0x7ff864bc97782⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:22⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:82⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1796 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:82⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:12⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4496 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:12⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3400 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:82⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:82⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5148 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 --field-trial-handle=1824,i,8539668827863385529,2405704382879742614,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960B
MD5036ce706b20b2b8b2babdd583181e201
SHA135c82e633af82b5fcc720d1165578898d2891436
SHA2563e0df143dd0a53f028ff9ab5b7237df248413eda55b5924d4356e7fd9b950f4e
SHA5126b0bb8bb52746a5133e918ab70f949ec7b834d293669ab20b7919cb8b3fa738c3ed656a7803b0c9fdcbce995b7c7fd54add5ce4d17a8124a0c3f2936e0289612
-
Filesize
1KB
MD528a223cd86770d6a4198800b2c2c5d5a
SHA14989c4bb481fb31f1a730a05a7a7d93257f75fb9
SHA256485a25c1865555c5cec9e7d25d2fe210ba4e0df258634a797558a4e26f1e9358
SHA512ddc2d93eea39ea904861faeed2d60adbb5d8a7e8222ca57f7b749af51d9786673ebe2c66ca0336c5fd20592f2264ad4d90b19433ce0a580232ac09ae46357834
-
Filesize
1KB
MD560221a919a4172e738c2e0bfcd2a50ea
SHA1cd9bce48247c28462e5b108af6661b145d255412
SHA2563bdd1e38a0d53372808faa11b734de8edfcb230f5a38403f186f339f62071155
SHA51299431794e4d451564b3fea8c7fb0c790c4cb8b0b93fa270c6d8ef13d80cb70dceffc30fea413a29d0a47345456c5e2daf86b69db4de60b7cc2fe4ab279a85aed
-
Filesize
6KB
MD523161ff0642a52b210a650dbfb617090
SHA1627d856bccc59b187d2e981b7a86085a20979dfe
SHA2564b7e0d9ec3b8a7a5f0fe425832212ea555919486b89e4f63927962e28bc400c1
SHA512d08c7cbd84d36aeef3db5ecfc78769cdd87c6627608f78e3f45d53e50a7c2ab5c36f9c73b989c73bdac58887dfbeee782f55b98d887d9c6a0021843621bc90c1
-
Filesize
15KB
MD5bdc65e0b501849d205b643d25cd87fef
SHA10e6607996ff9116eb9627abbdb50d8153d783048
SHA2567fc13dbf3912fe3f9b74ddfef21845021e53773a00e6e9f609910ae489975f94
SHA5122376086727efc536ff85f8a6c54cf74c9205f3943707597b4bcfeae62a72f59b6a0688bf24c9ded8ac7a78697a9cbd28027e9339efa72ca00bc45a74803a209b
-
Filesize
173KB
MD512a5f9a62263ce2e840958fa9eb4b31a
SHA10bd0ef89c4c7a3c37d040d4c84ef332fabff3c2c
SHA256fdc42164f277e9dd56d19b6ca7350254d1d035dd473a5ddc776509e143a5a62a
SHA512b0ac39f7f1a4fb18773891eb16b6ada50bacef972c0ce46f7a2e52646059aa3c6b28483323b055547469dd36abf5486f85a51ea8bd0ae2f3e8b8c929208d9b80
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd