Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-ja -
resource tags
arch:x64arch:x86image:win10v2004-20230220-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
02/06/2023, 02:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cbs-gc.com
Resource
win10v2004-20230220-ja
General
-
Target
https://cbs-gc.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133301544087861688" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3308 chrome.exe 3308 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3308 chrome.exe 3308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3308 wrote to memory of 3812 3308 chrome.exe 83 PID 3308 wrote to memory of 3812 3308 chrome.exe 83 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1892 3308 chrome.exe 84 PID 3308 wrote to memory of 1996 3308 chrome.exe 85 PID 3308 wrote to memory of 1996 3308 chrome.exe 85 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86 PID 3308 wrote to memory of 3224 3308 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://cbs-gc.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8e0189758,0x7ff8e0189768,0x7ff8e01897782⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1752,i,3128783896550456107,9079091942013018775,131072 /prefetch:22⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1752,i,3128783896550456107,9079091942013018775,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1752,i,3128783896550456107,9079091942013018775,131072 /prefetch:82⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3132 --field-trial-handle=1752,i,3128783896550456107,9079091942013018775,131072 /prefetch:12⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1752,i,3128783896550456107,9079091942013018775,131072 /prefetch:12⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1752,i,3128783896550456107,9079091942013018775,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1752,i,3128783896550456107,9079091942013018775,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1752,i,3128783896550456107,9079091942013018775,131072 /prefetch:82⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 --field-trial-handle=1752,i,3128783896550456107,9079091942013018775,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57bddf295cf2444ad5a336a9a45020369
SHA14ceba2a7076c347750d35f1315c7e317ff536564
SHA256a875c5803d1e927b238456580185a4fccc91bcaada65b7302e3906d1dcf2895d
SHA512c7a83836f5727ee52ee10750b4cc03c97467a4026cd07ae858d1a538c52541fcdaa164989ab39a78cfa7d851b315e6ab0080ac9ed24cf75039dc4762a7641a68
-
Filesize
2KB
MD53a1223768047a25aed5006018e6e955a
SHA10e55a28f003f7d84f44d98a1bafca0efc16d7d3f
SHA256911eda8bcdba9605277123348b10777b4a33aee0c5ea62b7b7b7e71d65f16075
SHA512f0006d096bb603fe99f6030aabd8e8e056106460034d8eef2374ca81fef9a40f37facbfd3dc35348db574bf9a010fc09a30b0aba99f5bf069be21638c7010e91
-
Filesize
1KB
MD5d642a5510cf8b1801a54c128a466ccb8
SHA12573cf6a2ea8bda1134669ddb5b21fc92411313d
SHA256f7b9d107cc6a64b854390b635a9ac2bf364f8ffbf00e8d6a4bfcb27050df4a01
SHA51269029f92b19b3bb0f0f15459760b62d9b288b11d246e9cdb37932312782b1820eba80c3dc56e92f94ab81954d637a08e062e0a03447ce410a88d39855243a71a
-
Filesize
4KB
MD59d94716980c7b3e4fec148448e2272a6
SHA1b3e7f83d9710c6cfe19c25098f4b0890dee8513a
SHA2562ea36d635698a4a10ea0effbfce4e6ea94d16d478a5550a988a2531e1777c3aa
SHA512a253bf405cc88d6ed17a5b58208131373f2278eda1ab6f1db98cc6cc4d51282b7927311d34e85fe79bd96c3cfc5723533a0a410a43c5864d814da4d1eddb3a27
-
Filesize
4KB
MD54839bdaa597aa4997e74562789b67c0e
SHA1ce6835a6c7f6a4c02884dbcb2b21bd2120e10084
SHA2561bd922485262bd85529964d12fa6a90a64a1610849af754f526f97d221edf464
SHA5124743ce855ab49e3dc0f30efb9fe708f6eb62f4ef8f31fdd8db2b4c5f508696c83e77f23bbff959c098f1afecc58344c79475133de045092cf7b59dbbc18ad19a
-
Filesize
4KB
MD5b153d1da84720e0e4559e04a80f0304f
SHA1bedccd9ead6545a1a8d6c6a3a6fe220449456883
SHA256c72078e57a81de379a50000a52d69fe57d26a0390d77205a631105e9c77d4281
SHA5128e94d9d33c9944b03eaa030322031823ce839b0940125b30eab42b5e50742a4712fa93a5a14d12a63a40ff437509083805c7331b597ea6d095d45583be3e05f3
-
Filesize
4KB
MD568198b3f715160de6e82b1ffe6388606
SHA11e20841623a101e9eefefef58d3ba49f4b08906f
SHA2565027549388a8f1eccdcbcda10cd5bbeb1dd278e30c1a3e4eb0e6394d4b22bcbe
SHA512012bedcf90e7fa9bc554e99c4631c3fa90aa8b8f37ecb28a83f7bdc1b4e835a32683389818b2c1b896c0a344f0748443c311438c6278bf6dbb9a3cdf529ca3d6
-
Filesize
157KB
MD5ae31282fcda20d29cc5a166c4832b2b5
SHA14b9b4e8752087a5ab88c90185b2900be8b50f0ea
SHA2562af398efa6e0113b4b43f8754993dbb3be613a992fd53fdcfb8ec247e10e45a1
SHA512472af42684b5c3f2e2383a8f7246e079d32435ded04da32f1985f8165181278ba863f677b2945ff534d3e0dad1232bc50342630eecb2a48bdc0a0f6080b48a47
-
Filesize
100KB
MD59ae47f0b81222451d9ba2d421d7a8805
SHA1123975808c4c89b910126280b7601787f35218d0
SHA256072c75c22b52160b2881176c510feb23e1f77dd4cf11ade513fc8c72388a5cbb
SHA512ead5297c16026dd26caf5edbf2812d35442f2f95cc2751e67cf572d6b6f4b2ec9a34250bbd39f7bbc4a9aa2363712abcb5c1791fcd225b02fdd4f9bb5148ce56
-
Filesize
97KB
MD57fb825473942a6cf817f6da61e055fe4
SHA110f7e7d0e1e91f4491ffd24518e18256780e637d
SHA256e29214ae9527cc14609ede6909bb79772f046f72d2f09efffb69f6579dcded52
SHA5124b7049ec601177f92effc7ba0fea8d0bbd278b3fc63d9a265c9d0c8986fded5f1c11ac56f363f2d87b4576f423588eed9bbeccb1d1b04c7ab1576eb9b1d8c62c