Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
02/06/2023, 07:11
230602-h1bvssac99 602/06/2023, 07:02
230602-ht5jjaag4s 602/06/2023, 06:41
230602-hf5mdaaf8w 6Analysis
-
max time kernel
1799s -
max time network
1799s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/06/2023, 07:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://yandex.ru/
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
https://yandex.ru/
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
https://yandex.ru/
Resource
win10v2004-20230220-en
General
-
Target
https://yandex.ru/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133301635237963875" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2204 chrome.exe 2204 chrome.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe Token: SeShutdownPrivilege 2204 chrome.exe Token: SeCreatePagefilePrivilege 2204 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2236 2204 chrome.exe 66 PID 2204 wrote to memory of 2236 2204 chrome.exe 66 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 2700 2204 chrome.exe 69 PID 2204 wrote to memory of 3752 2204 chrome.exe 68 PID 2204 wrote to memory of 3752 2204 chrome.exe 68 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70 PID 2204 wrote to memory of 4896 2204 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://yandex.ru/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff81fd29758,0x7ff81fd29768,0x7ff81fd297782⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1748,i,6034682176104487976,13322077460293063202,131072 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1748,i,6034682176104487976,13322077460293063202,131072 /prefetch:22⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1748,i,6034682176104487976,13322077460293063202,131072 /prefetch:82⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1748,i,6034682176104487976,13322077460293063202,131072 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1748,i,6034682176104487976,13322077460293063202,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4372 --field-trial-handle=1748,i,6034682176104487976,13322077460293063202,131072 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1748,i,6034682176104487976,13322077460293063202,131072 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1748,i,6034682176104487976,13322077460293063202,131072 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 --field-trial-handle=1748,i,6034682176104487976,13322077460293063202,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7fd7db1e-0be3-4d01-94c7-bd7f42fd02d6.tmp
Filesize6KB
MD57139755ff0b3b4d96a965e625fe5dcaa
SHA1d26802cf1d25047395083c1b1900cf12fa405035
SHA256fc7e85f91bd6b89c01407a7d439a3a57f57ac2b9d505a1b7f58c4b8664236c9c
SHA512bc4ed447842202afbef09ed8dc4dd36bc247442a21aef88d311ff0d38b7f63843005837a832e51664091b1e36e29b70886537533edf79a34372180d37eb8926d
-
Filesize
408B
MD532ddc7b3155a343abaecad9c769319d5
SHA1487f5ad576a5121853a909c88f993de9eb8e4090
SHA256e8f525f646b9b9216a2b959bb7f0dfb4d4d55c96ba8f6009174c35b3578f93a1
SHA51221fc81622f4b55d5f550a43e4162f72114ea4913f824e2f1decf5995afcca0b0a5e3edd8b98fa56745c22f8c20a3686c91a0d810bb84806365e49665470d6834
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\001\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD57f9e6a0414b89dd5b676ca8c29b164c5
SHA1691a1a19cbfd22306e73ad50e3e585d523782e8e
SHA25664c81661dfb9beec5a957b93e3f4f70e64d11bfa11be89a36f1f29c36e0a19b2
SHA512f2785e0ea02bcb2ed0abbc7295bfe8417d2cf76ded0b9751fd1c2bf5add5dcc5d0360b59fc2dc280fc1b5eb09e333a77ea9c511f3e6d129a263be4341f1a1aec
-
Filesize
1KB
MD5123dd9759034017fb7f912d86cea5cb1
SHA168cc61d8a4ab4f89b0a68d665b901d4394519f8d
SHA2566052a359f2cdc24b9a8d72d76e1ad154e1c41037909ccad511c33b3657440426
SHA5129f9ab82319a7bdabe06fc0da0734d77880c63b430a76f9243fad3f2fcea52b3b30728956196bfa57bbbdf8929c4165b8dc8aba79d8165e1db9522f5d1d90a65a
-
Filesize
1KB
MD50ffef2f7c0bd1fa7169a75d4118e88fc
SHA1605d2e19399fc5b8e40828bf2ae0680d7e801fb1
SHA256b364e4d64cb22473af4bebd2b4d9fb2c5d2c81dc3e81835737da94c9ffe414d3
SHA512f12136c700b4ee060d89ce6a0723936a597c244fa4718357bfb9442160ca8db80796dbfa4dcca1217090f312b2d180b501925389473a9e46a7c5852840d33e8d
-
Filesize
158KB
MD52dec365be1ea99cbed30a4d163d727c0
SHA1a8415af27b0c423cab17cd7e26d154a0b07778d6
SHA2562f4a90a7da2ad797e3c132a4110a7a732de5b1499909bde1ecb536cb1a3632de
SHA5121bc12d3e3ac833ba6cc9be36eacfc89b48a272e88cb6eea3fa75e593074ec5ed5ca7abc7a39c696978ff2f4ac2fc03b07a5426184dcec1d6a5c8e2e57deaa941
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd