Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
509s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 16:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://neilralph.awsapps.com/workdocs/index.html#/document/fa51f72652aad2da736d0d1d4ef6190cb2e226e0ebf86c6117fe773be5e77a9e
Resource
win10v2004-20230220-en
General
-
Target
https://neilralph.awsapps.com/workdocs/index.html#/document/fa51f72652aad2da736d0d1d4ef6190cb2e226e0ebf86c6117fe773be5e77a9e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133257964197554782" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 3312 chrome.exe 3312 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 1496 4616 chrome.exe 88 PID 4616 wrote to memory of 1496 4616 chrome.exe 88 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3384 4616 chrome.exe 90 PID 4616 wrote to memory of 3384 4616 chrome.exe 90 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91 PID 4616 wrote to memory of 508 4616 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://neilralph.awsapps.com/workdocs/index.html#/document/fa51f72652aad2da736d0d1d4ef6190cb2e226e0ebf86c6117fe773be5e77a9e1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffd1db39758,0x7ffd1db39768,0x7ffd1db397782⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,10824934409074987627,90854755847859611,131072 /prefetch:22⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,10824934409074987627,90854755847859611,131072 /prefetch:82⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,10824934409074987627,90854755847859611,131072 /prefetch:82⤵PID:508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1812,i,10824934409074987627,90854755847859611,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1812,i,10824934409074987627,90854755847859611,131072 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1812,i,10824934409074987627,90854755847859611,131072 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5352 --field-trial-handle=1812,i,10824934409074987627,90854755847859611,131072 /prefetch:82⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1812,i,10824934409074987627,90854755847859611,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2780 --field-trial-handle=1812,i,10824934409074987627,90854755847859611,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD50e0659bc52445003d80a75160dec3a6c
SHA18d2f98258457eacaa3636f30aeae71f33d5b4054
SHA256a6111c460f6922f292e9caf8f6b2ff817d1df8be405fc19c3c82b303195d1568
SHA51243c087f6199272818414b8acb1ffefd14b7db3bdf3f6ba4d17374d6156c804200dae7718bf6c36057ebcbfbc4037122a2e8e3a08d63e3433c5a449092bb4fd34
-
Filesize
1KB
MD50dbc99ad0cbe6f38d07230164e50116c
SHA17d63a64c7b757cfc90698b1225333e792d73ae26
SHA256898691c63ebb105d4ef1c5613430abb5428958b4252ea0e439350a6a59accbc3
SHA5124a404ccde4ed3fc1a2e3f18fb30c7031a5999ea41414d925ec44312ec119e19882d40c4792b34e7d3989f638d0645c55b5048e86618246302767fae03ed61d46
-
Filesize
538B
MD5f9dd2dd73ae296d61fa07e0ba7f14b37
SHA13155a47d0a30d96f3c4027a8be78d7c59b386a6a
SHA256113ee567df62ee858d0b0aa907f6b5e46e56da05f93a28b1b963f178085448ca
SHA512a74812b5032d75569ea2d01045160def252203110e130d071c1809edaf9da06c5dca539edb8de3afc6e818baa460a8cb8b39f2a58380bc0f7d036171f077846f
-
Filesize
6KB
MD52f17b2b44f1c57de7a1fcd4766500a4b
SHA139883038e8f12ae6980bc6ab66a06050d2b27c3d
SHA2567536782076279a05c83ca00ec79684e31b30cd4d679328945df12509f9700c9d
SHA51213eb810b0db042e0b22d6a7ef2530ce1e981bd1a98855372266eb9b81163a2af5ea20896bd4d13c751a21e9135cff2f46718c455e368567b437db4a502a92a96
-
Filesize
15KB
MD5cd12571048258692d5fcbde6aff5bc4b
SHA1e147d4e7995768c39652a5bf546fa04d27b5f97b
SHA2569b565a1d6fbae1880ff194a82e24f5b08e6ddeb72f914ba77f16a8db8edcb16e
SHA512a7ec185a723f6f213d57cbee1ce465034452af9bf914b5a012ca30def98d616dd152acafe965cbe7062068ff80e858d186bcb079c7fa8d91739eb9e59776e9e4
-
Filesize
199KB
MD517d8bca589ab44f65a0f972ca4f21ab8
SHA118981c750f0a41def533069aab418abbcbff9645
SHA256528ca1b28974066ac9508ea23f5745cedc3cae4b569ab6ff43b381eabe135f25
SHA512f9713644abfad759a53e225bb082474898d0c6a668d659eb730772459aefc664e1c5ee4383584fb97750c7b3012c6f3f5b56d216b00b15debaebd67cf1909095
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd