Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 19:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://view.email2.office.com/?qs=5b09e2f94aa1aa9afb11c179a370c4c86aef1196b3cc14c6001bd7d1210c834d86b3c67b17266c5fd60db6083b914d1aeda8ad1388b62b47e26a6f9efdc729af1e9da0a4165ab95f61a30201387698db
Resource
win10v2004-20230220-en
General
-
Target
https://view.email2.office.com/?qs=5b09e2f94aa1aa9afb11c179a370c4c86aef1196b3cc14c6001bd7d1210c834d86b3c67b17266c5fd60db6083b914d1aeda8ad1388b62b47e26a6f9efdc729af1e9da0a4165ab95f61a30201387698db
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133263260339855618" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 5000 chrome.exe 5000 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3968 chrome.exe 3968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 2508 3968 chrome.exe 85 PID 3968 wrote to memory of 2508 3968 chrome.exe 85 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 3716 3968 chrome.exe 87 PID 3968 wrote to memory of 212 3968 chrome.exe 88 PID 3968 wrote to memory of 212 3968 chrome.exe 88 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89 PID 3968 wrote to memory of 1892 3968 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://view.email2.office.com/?qs=5b09e2f94aa1aa9afb11c179a370c4c86aef1196b3cc14c6001bd7d1210c834d86b3c67b17266c5fd60db6083b914d1aeda8ad1388b62b47e26a6f9efdc729af1e9da0a4165ab95f61a30201387698db1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7d6a9758,0x7ffa7d6a9768,0x7ffa7d6a97782⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:22⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:82⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3204 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:12⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4904 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:82⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:82⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:82⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:82⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2844 --field-trial-handle=1824,i,12581236138499021777,12435058828734426547,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD568b64ffca9b92252b79b193fba350dac
SHA16626c5db6e70e2214e242100451baccf2d4c93ae
SHA25608b2d66c6eac8bc8fb428b53e7142d48167baba23ad57778d121c3cb94df195e
SHA512cb78610864bd06965f730167135884883c25af2815d33d863c80bfc80ea70935261137f7df5d1e77e3b40a183ada57ab79df71bb0659b35421ace7538e705ff5
-
Filesize
6KB
MD54ee6bae1720330d2022861a1247af92f
SHA13446b19ba505c9af690197429d8711dd8b9ac560
SHA2562720b67dacd9a1d5883b9223a1369128d739c21030a5bc5e0c2697a9d7dd4710
SHA5124c6441ca6750fb94ac0e3b28ea70a1ef3e6eaefffcafa1daf05e48359c1049632bc951607c04c1a18057668393713f0421f64fa1168b45d7a5f9bd3fcd0294b9
-
Filesize
15KB
MD558fbd468cebfbd7f07164cd35c0225fe
SHA1b37861ed53ab5473fe3acb5bd1bfe5443139bfc8
SHA256a60d98ff09c6cb3784d22ac10d70519ab059b2bf0832745acda7fe711bc5cff5
SHA512ebc87058fd631a9b2325b452e77b520071d27652f499d83d834f759a92296b46c8ee4b89e3ac0c3e1191a467829e3f0e46182e2035a7ddccbdc20f513bc9915e
-
Filesize
201KB
MD5b49c60994244f0d77c858a0ec04567a8
SHA12096fcafe600432f338bdd2cb88d9acf67da06ca
SHA2566342e6313dd02d511c38e29c3559d4c9382b4271040eed0a1049d6df34bb7306
SHA512001b7156aaa9b6b1cf882c93bbebffca898c114474c7fa3dbe92d51bf894d86e5ffa2657f1616fcaa5d06b6f31101de1045d72c3c0d339425564b52122147fd3
-
Filesize
200KB
MD5e399c117ff41948bfce9b7976e0e57b2
SHA1863b5de70dd9379146602782fc24208fa8944bd6
SHA256830a4a910ae83ee738a3f240bd23f8fa06c0a2f35a3caa2a1758dff3284173b3
SHA512522d97707125d06bc2b7649c14277a4c0b4740042bd8f6c2b88c4fcc41052f14def5a56a0d34d3bd9c3b88ef360a6cbfd1a5999b06cfc907cb61871748963307
-
Filesize
72KB
MD538c2149bd563232e3d528be085b4944d
SHA1976507017769553bc02e70b2873f46ca6ae9ce1a
SHA2567fec81f13d40d1221cc375221a7e13f1913d59e6930d7da3b6bbe15630223be0
SHA5126a53cf40ebaf5ac0d63c71cb8d04926199deceeaa7e443d25ac39f360a8a991affe4168da45bb9797d3fcc76235a93b1a3dbea8919bf57c9e78795e7a69adcb2
-
Filesize
201KB
MD5cd9dc61823d7bb0b9a3824a03e80ed6c
SHA1066221fe3192b2b961d2951ccb596e93130c619b
SHA25608193280281c8c71e184fa791bb03e14198494499e7f5d1455e98667fabe008e
SHA512c07f2617690cda4ae1f9d904c5ca6bcf0d1ab8dbec45fcd9fb65a6e481216a9ab8718529489356e7c9eb97c0b29fb12acb0ff72675b70ab9b98bd9c9a96ac51f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd