Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/06/2023, 16:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://patriciabernard.com.au/wmddouglas/wp-content/uploads/2022/05/05.png
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
http://patriciabernard.com.au/wmddouglas/wp-content/uploads/2022/05/05.png
Resource
win10v2004-20230220-en
General
-
Target
http://patriciabernard.com.au/wmddouglas/wp-content/uploads/2022/05/05.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133308026789993723" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4124 4112 chrome.exe 66 PID 4112 wrote to memory of 4124 4112 chrome.exe 66 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 4216 4112 chrome.exe 69 PID 4112 wrote to memory of 2084 4112 chrome.exe 68 PID 4112 wrote to memory of 2084 4112 chrome.exe 68 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70 PID 4112 wrote to memory of 4264 4112 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://patriciabernard.com.au/wmddouglas/wp-content/uploads/2022/05/05.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9d65f9758,0x7ff9d65f9768,0x7ff9d65f97782⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1756,i,8358232856383419851,7137359320995127666,131072 /prefetch:82⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1756,i,8358232856383419851,7137359320995127666,131072 /prefetch:22⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1996 --field-trial-handle=1756,i,8358232856383419851,7137359320995127666,131072 /prefetch:82⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2732 --field-trial-handle=1756,i,8358232856383419851,7137359320995127666,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2740 --field-trial-handle=1756,i,8358232856383419851,7137359320995127666,131072 /prefetch:12⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4624 --field-trial-handle=1756,i,8358232856383419851,7137359320995127666,131072 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4708 --field-trial-handle=1756,i,8358232856383419851,7137359320995127666,131072 /prefetch:82⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 --field-trial-handle=1756,i,8358232856383419851,7137359320995127666,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1476 --field-trial-handle=1756,i,8358232856383419851,7137359320995127666,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
688B
MD52b230059ca1e4506ebb09c9aa209d604
SHA193c0c10ede6ea60cc95786a16b47adc2c34462e8
SHA2564e47a8a1c86ddacc6883d0b6d58ae3b49ee1a3c3f3a51ae4b2b90eec0f5878b3
SHA5123a8d197bca8f544357643ac80ef1168f7d69ac67d318c3b2f388cbf6742cd05993c91ff53bff4f09dafb2e7c562315c13d5bd405a47cab3d08c82aa068bafa99
-
Filesize
5KB
MD5a5479f86df53a818f52f3e10e7c796c3
SHA17cc2ee5986630b7a85b13dc24ba46c7459d2b973
SHA2561a772f6ec04eba9bc8aee69ad10bf6405fb169836a94e0cded15ddd2c9bb00d7
SHA512babe6bc9193ddeb17ed8e6cb026e12d2c2a6be6a2dc311ea2766e71de56d3d6dcaf8408e43fed6812b9d76f648c7043c7cd515ab18b75ebd465bcdc8bd71a1b4
-
Filesize
6KB
MD54832abed7704e1baf5fc907d5dbce73b
SHA1bcc4b87bf6408174724bd32ee2309840d717f968
SHA2565435452161a1142a952c1ae306e5732b8a5dee10e200e2d76b26fd7161f1c13c
SHA5124a2f552bf440a5601c392e84f013cc1f3d5b738f80870d031fd9a38cd669ffb26faf405f05aa8e79470b46b72dcec54d337436c372c38e1f1762804a95887cf5
-
Filesize
12KB
MD5904316df5376e5df306a4898c3a2692b
SHA17ff95bc4d03dc145e5ea3e4a49d19dcffefa1f93
SHA256777999d63d6e816de38ecfa1afc2a1d3a3737623a36ce157a5fda2ffff1226bf
SHA5125cbb04d605eb25c9f0a1fdace276b77c0c5ec2136a28848d0370574ff483526b3ec3cdf0b4273cd9d83c2f6236ebe16d086a46b4ba26bd8b10243b3d2cf757e7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\fb43bc09-a8ff-4446-89fa-df247dbdd90c.tmp
Filesize5KB
MD5164f3c3385970f7aeaeda6d00020e94c
SHA18752e4a6b19e4ae9fd0cc7e50028be54b7fd4e80
SHA2569d18b9da9255f10560dd143514ca20a75906658f00648ad72b6dc4b34c176245
SHA512ebb7c335e9e4f7365a617ecdd405bd807ebdbce12f7a3d6097390e207582131ea487765599ec08bc140d44d083922b8cf350d5cac2d33b188e944f9230d55c1e
-
Filesize
158KB
MD5a00554852efc6e19979944e8806a92cc
SHA1ce13b561e199309dd727899e4a62293547c5409c
SHA256eb5815f359551de24036c2002d5b56a44fc0ae2cacb338717d9b1cd43b729128
SHA5125f1a2140d58f1f19fb5880f2b4bf288eeed850451fb286b99ea2bc588aac99ed5aeae9c0e13ff850371832d0f9a69fcf8280ea68372353452dc091444de68571
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd