Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 16:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://performancemanager8.successfactors.com/sf/uxrFeedback/details/8F83FF05651145D4957A90656969856A?company=walgreensb&username=1813450&st=F0232DD73E32933CA67BC6C597289A88D183870F
Resource
win10v2004-20230220-en
General
-
Target
https://performancemanager8.successfactors.com/sf/uxrFeedback/details/8F83FF05651145D4957A90656969856A?company=walgreensb&username=1813450&st=F0232DD73E32933CA67BC6C597289A88D183870F
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133289080803471636" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 4568 chrome.exe 4568 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 524 chrome.exe 524 chrome.exe 524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe Token: SeShutdownPrivilege 524 chrome.exe Token: SeCreatePagefilePrivilege 524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe 524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 524 wrote to memory of 1120 524 chrome.exe 83 PID 524 wrote to memory of 1120 524 chrome.exe 83 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 3248 524 chrome.exe 84 PID 524 wrote to memory of 640 524 chrome.exe 85 PID 524 wrote to memory of 640 524 chrome.exe 85 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86 PID 524 wrote to memory of 1812 524 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://performancemanager8.successfactors.com/sf/uxrFeedback/details/8F83FF05651145D4957A90656969856A?company=walgreensb&username=1813450&st=F0232DD73E32933CA67BC6C597289A88D183870F1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd44969758,0x7ffd44969768,0x7ffd449697782⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:22⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:82⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:82⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:12⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4484 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:12⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4756 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2828 --field-trial-handle=1836,i,1650233857746867045,14609826609098790677,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5d312aa9620d2172584efff33c6070807
SHA1c3ecfcf4c5b1dbf3b3e29542270683fad195f29f
SHA256b32771abfefda25cb3158c7f5b1875ed88715a61a75961dfc1dd4152bcba0cf7
SHA51227e7aa7185acfe3534902eb15f6a376d43e449d4646e00f16f81e0213deec35006d632c4df6638b1267cc912f0b63811d7661c574e1484e7346f6fda2b792544
-
Filesize
1KB
MD55a951522662c08d9a7894b296e765312
SHA18246d72f4b12fa0a4db3d1bb88261d16423da8d9
SHA2568e3e69235d0fd28757c03fd02918bfb0449e1982356c3df2419b5d60afcd8995
SHA512b8acdeb6775396f0216af7bbd3dd449f25d4580fc0205e22f42df65c9c3ff6005d8f5400c3f9e2fba46394daf05cc0e54a9498e7642c9662ae8aa4e3b654258f
-
Filesize
706B
MD54b45ddbd5a6a052c7d8b9358b5efb727
SHA102265aeba6728d6dae274e1571b7b2de49986dac
SHA2568069770d31b0f0124076d429d578a2ad7f76d324bf90310cc0072644a65afa64
SHA5120da968249682d84aed1ae11c6d203256d67f597b7f6b08fe56f510b2b115812175085277d2967eff62a23cd91bfa183ccdfaeb8c9ca99334d4c69b477e7d59ab
-
Filesize
6KB
MD566d5ee7774f901de091354d3284347eb
SHA15cddf9c792e219a569188d8170a0f2ebdc657507
SHA2566126de189a86a2bcd449b7cfac18543f16e853d4ff382d9f3ab3c67c7b2dc7e0
SHA512a46ee3bd25c569e885f886f6693d84a0d9356df7cca1cb428bca700229dcd5da7194b036e8b129c13530c366ec07ad68730edfdd8750384188ee4ba15ef3432b
-
Filesize
15KB
MD52c6f67bf392f69ad97c9392ea4f83cd9
SHA139416ef33836949bf401b40ccb6a6251891f8ccf
SHA256905554ad47b950c735c6abefe3307f2c9351a1ac137d1c646fcea70f7f023dc7
SHA512004d8005b3b6cfeb0b568c3cfef89b6a204be81098449de582a4b021e906d37b3b20807230a2ee37a845f6200563fbedc7e420cdcbf5f3391465a1ed67652e97
-
Filesize
153KB
MD503798c3d4a3f46825ac84caee8644cc3
SHA12552a1f58a1ea55a8054fe5caff30061c4c7595c
SHA256154bd18b1184e5fab57d0a91af03d0fe2ae6b7622f2d7ea1bd6d3fb9c2668bf9
SHA51267b244da616af42003cf977e1fd297ff69bb4406cffe075c8411f28432cc3c222333d8be1d3e6a36a404e814f460c88792f50da6b0f1ab40a8c8175e3451295b
-
Filesize
152KB
MD5e63e358cc7a9d785378567c40d0d5876
SHA184941af9ccdd621b0da4a0a4ba7dfc1454c62e3a
SHA2569f9e43f28f028b6ed17e32693cd74a047bda98f25607d1c3d57871bce6c3b0aa
SHA5120ffa347b9285c3527b1adad2aad6eda19c6f471e9575bd6bc540fd3b28874602e8a920f094821f17792d9851c9d72f8cf881d4e32d0c0551366e040727bfc96e
-
Filesize
72KB
MD5fe246e5d2f3717fd573b8242d51c8df0
SHA115601a7906c2c44954d0fabacc5e8770831d0442
SHA256f4edb78ca944e623f8751b474f31d194d0e71bd89d1ddd87a19ace1f17cc4fb3
SHA512e3580237c82318dde72208693d626d3ffac57982c8f70e864d1f1ea36c61a761084b9a2610225669eef4326451a656caa6f47647616c383ac7be8b79d24434ce
-
Filesize
153KB
MD5b485fe5240f0b019c8baeeb82f9dd17a
SHA1083fd09117efad18e1c8d638edc4af835bcf9152
SHA256b21b34ef061ceb518d627e215760c8c898a5900b7d2a313b0c5d1f9be39c575a
SHA512266357801150214b8ecc9264562c2a646a776a794aa04a110acb0aa4a1ca2b785f1b5e728a561076fb7d773109fe2726206742d62d4e85ad84bebe9c1ffe9ce4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd