Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
31s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/05/2023, 15:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://awtrust.in
Resource
win10-20230220-en
General
-
Target
http://awtrust.in
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133292510097564357" chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4220 wrote to memory of 4228 4220 chrome.exe 67 PID 4220 wrote to memory of 4228 4220 chrome.exe 67 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2076 4220 chrome.exe 70 PID 4220 wrote to memory of 2548 4220 chrome.exe 69 PID 4220 wrote to memory of 2548 4220 chrome.exe 69 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71 PID 4220 wrote to memory of 4900 4220 chrome.exe 71
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://awtrust.in1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe95be9758,0x7ffe95be9768,0x7ffe95be97782⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1848 --field-trial-handle=1780,i,3137912342333551791,5228551796059611063,131072 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1780,i,3137912342333551791,5228551796059611063,131072 /prefetch:22⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1780,i,3137912342333551791,5228551796059611063,131072 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2760 --field-trial-handle=1780,i,3137912342333551791,5228551796059611063,131072 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2728 --field-trial-handle=1780,i,3137912342333551791,5228551796059611063,131072 /prefetch:12⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4680 --field-trial-handle=1780,i,3137912342333551791,5228551796059611063,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1780,i,3137912342333551791,5228551796059611063,131072 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1780,i,3137912342333551791,5228551796059611063,131072 /prefetch:82⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702B
MD542bd9375635fcf9871e93854ad2bdf0b
SHA1ab1b75d2607e5520467551a074ba6fdadc06f562
SHA25638ba0e43926c66d0dd070cf01ccce588e1e3f29fc02e356674d1f41eb4b12da5
SHA512327c02a95074468c39f88e42acf79a965e6b4b9c388fa0f997ea706bfa745f776c96765589c95934b739f55238e36fe38754b397e85e6fb926bd01a9778d5572
-
Filesize
6KB
MD525be184f4ae4aefb2b398adbb21a62ef
SHA1dff4461c0301bc914c94646bb9b95c21118859f2
SHA256b74c908e31e230654fefa03e9066e0dbf178c1fdc0e15d93c6448b134945ab06
SHA5129b9adfe8bc826771868a566b7a7b7a95dc7e1da16ee52b73e971693877a2967c205fc366095d6308cd48fbf7e4eddfcb802123a03fd9fdbb3b2b1bfe239e0f4a
-
Filesize
6KB
MD52a5cf020c3751fdc4ba7f4cec313f4e8
SHA17979d928d318c4052a8b0dfa4943af084c3e98e7
SHA256e48b4965d86ee6863d33f0944b70a3c9f50faaa76bb89ff7e9c593ac7951466b
SHA51202cecc8cb22ad162ad897ee9a887d519dca8929c0ad4455f02f9553f8a8a9e7fe549822ddfd49f71eda3762b9b67a59473277025fa04848d50b2f4247ec45d8c
-
Filesize
12KB
MD5240148fb548049c8483d8cd61c72f26c
SHA177d4552c37f6ab3c7467122cb3cc5ce4e0256fc8
SHA256323ea3259bc325d930d191705d606200f79d6400a064437ee963afdd79f8bae5
SHA512616010be50a7c75741aa110539a0a8db1a84370ea32b3272fd0abc761f38313f33ba7eddad95497ef666c606a111624b726a4bbb364258b07922428c4d1d81b6
-
Filesize
151KB
MD5bd5fb0533260012a0e738591dfee9f2c
SHA1747311824df3ef5dbd6cfca6b3fa233b1fd798cf
SHA2569bceb51dc5af85eaf7fe3bca725ec23b7fa1dc9b95d7a8a593d2c8cd1279c875
SHA512f8198ca75dd99b7fcc8b9edb89bba72e9d18e6c2beea2146e1f8d6424c18ab7d8360a3d28a2ed9842c3fe49f28f6af948b65503255f5e1de0763dbbc4f583bb7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd