Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/04/2023, 12:10
230403-pb4b3sgb2w 1Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 12:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.abb.com/global/gad/gad01366.nsf/wfrmForward?ReadForm&unid=8380BBE1F86198F9C1257CC4001A1994
Resource
win10v2004-20230220-en
General
-
Target
http://www.abb.com/global/gad/gad01366.nsf/wfrmForward?ReadForm&unid=8380BBE1F86198F9C1257CC4001A1994
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133250052648227600" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe 1092 chrome.exe 1092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1920 wrote to memory of 4632 1920 chrome.exe 84 PID 1920 wrote to memory of 4632 1920 chrome.exe 84 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1448 1920 chrome.exe 85 PID 1920 wrote to memory of 1428 1920 chrome.exe 86 PID 1920 wrote to memory of 1428 1920 chrome.exe 86 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87 PID 1920 wrote to memory of 3240 1920 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.abb.com/global/gad/gad01366.nsf/wfrmForward?ReadForm&unid=8380BBE1F86198F9C1257CC4001A19941⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa662a9758,0x7ffa662a9768,0x7ffa662a97782⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1964,i,15812598924479713748,16684910241117140823,131072 /prefetch:22⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1964,i,15812598924479713748,16684910241117140823,131072 /prefetch:82⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1964,i,15812598924479713748,16684910241117140823,131072 /prefetch:82⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3128 --field-trial-handle=1964,i,15812598924479713748,16684910241117140823,131072 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1964,i,15812598924479713748,16684910241117140823,131072 /prefetch:12⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4480 --field-trial-handle=1964,i,15812598924479713748,16684910241117140823,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4756 --field-trial-handle=1964,i,15812598924479713748,16684910241117140823,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1964,i,15812598924479713748,16684910241117140823,131072 /prefetch:82⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1964,i,15812598924479713748,16684910241117140823,131072 /prefetch:82⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1964,i,15812598924479713748,16684910241117140823,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
624B
MD5aa99168c40986af2a830a53271acb7d1
SHA15614238bc7d641c223a0443d5b66ac63dda847fd
SHA2569c366e79586506001af8217f27f3b991e038bad74e4d4f151a4313ec8d495030
SHA512ba6eca2f1dd692d6c400ed1949e92cb1e32baffc651d9fc85b9a6e45364df0ef69d3200993764e3844b7ce98c22b4e5d837a6b7a02cc5fedc2e5c32e58cb3846
-
Filesize
1KB
MD552797748c3868cac98c68a3b07882ba4
SHA18262aaa63d8b2a38097d811bcc1d7601084e6c24
SHA25692ff04e1115964348557e175a195c00dbe1575383f9048b01d0045549ad43f4c
SHA5121cadbeccf15ab31ca522094bf237ad9acaae5d0d3f6c50286ce162f124f81a1ba86b87146b9df61724e7f01ac22290153ffdacd0efa29c350d39ad705265b22c
-
Filesize
872B
MD52fed4f26019a6b0edbd4a2218b3015f1
SHA17ec43e6519b8b95922b48d40787ca92751ef6d44
SHA256f3c8801344ce2027aab48d896716dfdf1c5937c53630ccb877b954ceb14062b6
SHA51265653e5750542ab9aa3b5dd95a6b4b82a12df71c48ae80f13eef3e8e312cd120e8049623604d715fefefbcdd4621bfac02931cfcee8bd563c28e1d6947eb035b
-
Filesize
6KB
MD5473534c153aa2215615e867eae3899f0
SHA110d69a66e42e410812e31fa37aa787fc6f305dd4
SHA25602abcb056777d9d67d5a448de4871745eb22519f613c7ac6f286f1d58dfd6e5c
SHA5128d9cbd5e8c4c63068f1531456086d7e9b37278c5bc161098a32108360569ac53cec1798a55ee39f9d7ae44640474d3f2e103f0fff566e8b7c50bd1cf9e4ec2ff
-
Filesize
15KB
MD54b6ad84e07f4e8ce31a6b38268149476
SHA191335c7d623efae905c93fb3bb8f1d6b5c643e82
SHA256d298a13a3f0577f67bc4e1d06d2c40983ba973f1f620c4bda3994799412fea63
SHA5120e610a1d44cedfbd4a0a1e150f614f15a0e8c5cc66246de6b9e8ca1bc56e2a6586b32cb48d70fea0079a29f07b06c9a5d916ef85e11989843bff492cf9e927ea
-
Filesize
174KB
MD57783aeae3f47c42210aa14eb7d6694a6
SHA1649ffeab8b77a687a351e7b81b292e0f494b1d98
SHA256a97b9a6e993115d12c2ad03745ab9866c289ee645e0841369c97c871bd840346
SHA512e4ba93ff255a22b1e81665995f5dece36b4daa93c7261443e4a98f552649137cc1fa8bf529a5eb3f56379c74d16f5c196bc7ddfb829d15ad33ad6e0e486d1ea6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd