Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
406s -
max time network
402s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 14:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chromeenterprise.google/browser/download/
Resource
win10v2004-20230220-en
General
-
Target
https://chromeenterprise.google/browser/download/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133289813828472256" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 3840 chrome.exe 3840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2004 4588 chrome.exe 83 PID 4588 wrote to memory of 2004 4588 chrome.exe 83 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1728 4588 chrome.exe 85 PID 4588 wrote to memory of 1160 4588 chrome.exe 86 PID 4588 wrote to memory of 1160 4588 chrome.exe 86 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87 PID 4588 wrote to memory of 4900 4588 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://chromeenterprise.google/browser/download/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd77f99758,0x7ffd77f99768,0x7ffd77f997782⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,1533588774036327841,3820611630931433354,131072 /prefetch:22⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,1533588774036327841,3820611630931433354,131072 /prefetch:82⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,1533588774036327841,3820611630931433354,131072 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3232 --field-trial-handle=1812,i,1533588774036327841,3820611630931433354,131072 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3252 --field-trial-handle=1812,i,1533588774036327841,3820611630931433354,131072 /prefetch:12⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1812,i,1533588774036327841,3820611630931433354,131072 /prefetch:82⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4468 --field-trial-handle=1812,i,1533588774036327841,3820611630931433354,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3520 --field-trial-handle=1812,i,1533588774036327841,3820611630931433354,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5bb7dd9188cf3ab3c30a99044cb3851a7
SHA146e10fe58237355706cb95f6993306ad60f7c56a
SHA2568d3bec84541547e25a8df274c2587a71fc45eaf202c6031d00d3ad4f001eb2b4
SHA512eec563723e22947f481c211b7317f11f499a682fe96c2bf74d0b82cd71a9b563447239a85188ca4c5bec3f2c449205e810e641e1af692ff352cfa188c6919e77
-
Filesize
4KB
MD5e74c9bfebe14f5a3a7c6505b59f4162e
SHA1a71e6070e165e876cec9f124a64ffd4f50b58cd9
SHA256cd3b50fd44fe480b4b8e3d5e9b58e6f4ccd4593c16dbf743355593a23ba0edc2
SHA5126213a45518128d0b5c89427ebec3f2d5bf58d093bbb00fe577f5b2549ea35238a6059c72c8a2e61e5e42bc6d5f57e471d51e07a9485575275b9e49cc797325d3
-
Filesize
3KB
MD57f02beaa09a322582a8bedf51d281d8d
SHA1bae8c7471ce15114ccdecb65c213d215bdeab105
SHA25674f50f4ad3dceedd16a84bffcc07a15484a2e7dd5b204b53003ea0be2a4f9310
SHA51239a94029aacf3b6af1ed89f0d250b4536fe1d75675db797cc2ba2f53b73895e0664e386f6720a5f6b0f9bcf67b83be22b1e5867709ebee70f6d8d6b72b6037d2
-
Filesize
4KB
MD5da20bd7bfa159963bfc049a4707694c7
SHA1e07b24be62cdccf5bbfba95e9b564c5709b80d42
SHA25632bf89f3a0e85798eb0afc1b5496f9f7f92dbe8ca3a523f9ecd18dd8dc39f515
SHA5129e27cb5be02662bf8a1eced1b0f7c99a43664bfb13a7df89c8f4e4297589b8cf0dc4eb313d3db3142678687978c73292a664ba8f5030cc53cdad3bee97aeb868
-
Filesize
1KB
MD5717ce1ba54be1b9e04f0429737f47b35
SHA107eb22f3bd7363c402cf874ff109f9975ab0a1d8
SHA256ca00dc45a4d4f05af3224273fdf1ee992238c2865a5167f12d94b9c39ec650ac
SHA512ea53af4f13d5252f023d6db08dcd3adc507719b13908726c87113376f775fb028d97d6cf45db243f80eb27d11fe5638f19da2c59ffc858cd2d78fcf5fd4bee3e
-
Filesize
1KB
MD5f85566bd0afad07bd3bf0d5d57104f74
SHA1bf74eca5b0dfce1266d6ff01ab3278495eab390e
SHA2569dd3f4edb132075399ab9094062d07c2f84a0cb0b01538989fd29d1ee2e3fecd
SHA512354779f26eea5c9c2fc8b7d9a223cfd5e86c41e05f3271e90cc9ab34878d1598eef0aedd5e21bb3012a370f5fe4b8177e506e6b0f410328074f38f91317bd479
-
Filesize
5KB
MD5461172f4910ae0431340798968616eb6
SHA103c0a18eb2459749ca2a0348e2c1dd48c43a40be
SHA2560a57bb59037741dcba56ec6305e64d290e9e4e254388b4de4eed4379553103de
SHA5124e27b1a9d7a84879218d150795ad67317f49abd50fb811e2f539868c7b8b7ef68f7e0dfdf52d71fd7481e5ed12ad1a3197dcd4c7f53576e9dd471199f63eec63
-
Filesize
6KB
MD55dbf824a9bacd21ed047a91d3704f37c
SHA1d36f4e8f62a872b0918611262b76c9787ac1cd28
SHA256cf4adefc7d697d5c266e43ccba88028db83eda40e0d516ad7986ec87e5b514b4
SHA5122512efa89f6fedc57dff389e3c50ce9b61c5d316563616987c49419ae0db38522a3b6983da27c228115b329a8b9b0c9b42cd62dfa647bc3fab93453989a7f95a
-
Filesize
5KB
MD587f458ac23a12e05a9575cac8747d298
SHA177abc1d46d34b005094cb8b1906fe3b34771aa0d
SHA2563ced8d4007b5459cb87a8289e5230ff81ddced27fc86eeae295b3dc912c175e1
SHA512b911772c7fdf7b3892f1fab7997e2862b26116e53a4410ce901955dce25da584ee10cc9281871f348573f866d30e1ab2917156a0b8f247d099f01d35fafa765f
-
Filesize
5KB
MD5b4d018e4329a79e717e04be594cb706c
SHA1b074841ed1e7a5395c926fc844a19994e3e4b29d
SHA256f226ec55de5e5ec70d58e5ffa94bf724f6ac15860172195ab7c188b66ce55f93
SHA512b8eb0fc75b53e9e278e01dee1c1ffa0157cd08a4a4672ed45ec199c3fd5f7eca578f81e14921643c5feeab4135d9eb8e2225af8643976bee6fc3e709edaf51ac
-
Filesize
151KB
MD53c531feea2e50a3ee13470066d822f6b
SHA18d96c37409dfe0225ef8743ea025f243387a43cd
SHA256e95c82f536b3fab0bb7d17d756d28ed9cbe65b44d64485615453f203504028a3
SHA512b272eba105443fd93dcd89c66556d97a131fc87f92c50a289f523e7bb3a4e2329bf6559b2461f52bbd804d89dd3ecb62d4e18377e44bb3d5f6f9412ea726373f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd