Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
23s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 15:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://static1.squarespace.com/static/6454d906dda45808abaa19f4/t/6456cb77a6285f2f7a1e8122/1683409863214/80201066195.pdf
Resource
win10v2004-20230220-en
General
-
Target
https://static1.squarespace.com/static/6454d906dda45808abaa19f4/t/6456cb77a6285f2f7a1e8122/1683409863214/80201066195.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294240640186698" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 4088 2412 chrome.exe 84 PID 2412 wrote to memory of 4088 2412 chrome.exe 84 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 856 2412 chrome.exe 85 PID 2412 wrote to memory of 1148 2412 chrome.exe 86 PID 2412 wrote to memory of 1148 2412 chrome.exe 86 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87 PID 2412 wrote to memory of 4588 2412 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://static1.squarespace.com/static/6454d906dda45808abaa19f4/t/6456cb77a6285f2f7a1e8122/1683409863214/80201066195.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff970019758,0x7ff970019768,0x7ff9700197782⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:22⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:82⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3200 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:12⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:12⤵PID:352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4536 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:12⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --pdf-renderer --disable-gpu-compositing --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4752 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5264 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:82⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:82⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5276 --field-trial-handle=1816,i,13119637999706481726,14475752529476203038,131072 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ecadd43327b1b7335be41cefbb7e2437
SHA1aaae3b1a8f58fdf7d2e31a52f52609485f6f4452
SHA2564e3490fd9f1044ed47564355ed80cb7e3f5842976633266dd935d91f465d585d
SHA5124f0f7056ecd160817ba3368671c8f983dbb26378484303b7dac8977683c389d27dd3ad4a0ccbd4e37b66b23c24a0ea99c1202783d2045d8523ce158d566c3d46
-
Filesize
15KB
MD53e37ea262e151b1402203b734bdb32af
SHA1921b8c4b0ca72c961b270c7e106f5cb612a02198
SHA2566d05afe90623bff4d81ac0950d3cbc25cc72c31f31a5b3562dc46a8aa17415e0
SHA512a7357c219b66b4f50c53995a5d6e016f846698f2a9ab7854888593c2e85cd576727501c1a5ae977e4fcbd7d1d1407f90ee2b0192cc28d3f01ed2c1f8da1bece8
-
Filesize
152KB
MD5fcfc730594d2eee9412f1f3a52be3100
SHA1fcda6b7b890eb18951aed1ded4ea04deb6b947ab
SHA256cb460cf6399d880a43439d3b7573a3979c21e44ccc13e55121b46c74ff0fba80
SHA512b1105d126cb005bec3eed7f6fb9755a2e68f82a41ce9965bdbba30a312131468aa6b0aae53319aa3ad78fca420be6e2dd2aa94980b5a5072c3fa7d2775974e71
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd