Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 02:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://dodocs.pro
Resource
win10v2004-20230220-en
General
-
Target
http://dodocs.pro
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133310953176708156" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3280 chrome.exe 3280 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3280 wrote to memory of 1428 3280 chrome.exe 83 PID 3280 wrote to memory of 1428 3280 chrome.exe 83 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 1920 3280 chrome.exe 84 PID 3280 wrote to memory of 2552 3280 chrome.exe 85 PID 3280 wrote to memory of 2552 3280 chrome.exe 85 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86 PID 3280 wrote to memory of 1400 3280 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://dodocs.pro1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb46ef9758,0x7ffb46ef9768,0x7ffb46ef97782⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1828,i,6441754287708019239,16047728988317240378,131072 /prefetch:22⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1828,i,6441754287708019239,16047728988317240378,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1828,i,6441754287708019239,16047728988317240378,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1828,i,6441754287708019239,16047728988317240378,131072 /prefetch:12⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1828,i,6441754287708019239,16047728988317240378,131072 /prefetch:12⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=1828,i,6441754287708019239,16047728988317240378,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1828,i,6441754287708019239,16047728988317240378,131072 /prefetch:82⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4988 --field-trial-handle=1828,i,6441754287708019239,16047728988317240378,131072 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2780 --field-trial-handle=1828,i,6441754287708019239,16047728988317240378,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD56d84e5126bc31247d5a3cb27eb467729
SHA1e80db2073c0f2878d8ef734d5cee0454cd5ae2fe
SHA256433e23a2c448fa9828a8cd1e25174fdeab8bbd53dda36bc7847e2959aa948bfd
SHA5124a053fe5432f476aef9229a1fe084bd7caff8110d988759458010b67f54f4ba885fe2498a5316eb4aeedff81667e3c4e19250a6a5e842d0032a91614789f6858
-
Filesize
216B
MD51111934bd650bb423b282baa0def120a
SHA13d7cac0291a73df932f86013bd0537c7b32551c3
SHA256b71aabbafb6f48019ff80e7bd828e910c7fd97e0e0e9cc100929407119b13ecb
SHA51280348358e5a26ec01d6ebcc0f9662c826dd89cd1e96e9a0b0bd3d5ec23a1dacee81c619d10e213c7731b6fda333d58f5faf823e74f413ad0da993d5156eaece1
-
Filesize
120B
MD5edf09c6e2815037dea8ac737f84c9380
SHA178a893f44571d710a8fb0ce003c851d8eda6fe90
SHA25610c949a25117d204959302296a8b03b7ae0afa3c5e9f8fa0a08eb126fcb844d5
SHA51298c78fc27cc609a02d9a3b6c7fb1bb2e6d46594a195e4065b419a721ef93e17d8ef9a4354e073d041049059c3b4cd3e7e39537ca7bf8bb8225278cad9795cdc9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\93fa433b-4263-4b9f-9af1-35d136ef603b.tmp
Filesize1KB
MD58f4a129bab9c71a8fed5cf5b418c0c26
SHA1a4c8a305bbf14453ad263ff98c04ad150a157b75
SHA256f33e60edc7d393d941858b65b5f73cda2b2ec379c888765ba330fd685d354112
SHA512a0e9bae468c775c94445e397678eaae8922af166b65a1b3bee1e4fa9356a1d60f737dfca60dbcecf95fca4b14ec939261e2941c995dbcf45a86fe43253f6b43e
-
Filesize
1KB
MD57922b7247b7bdd781b5852ef8f8d222c
SHA1dac525ffdeb708a764f97afc3b6cb91467448bd9
SHA256335ce2fe9910138578b7a69fc8e7cb57b6a892c78aa3c583bb542b006dde9cdc
SHA512f76bb811a8760e3fd4687f1792e9c7d0c96c63c19ba78b340cc455923a38345a0b16a39ffcedfc755d64cc759973286aeccdb3e4ca5008aeedd926aaa22ac968
-
Filesize
371B
MD509a59e493b85fc8ce4736c9b277dfac6
SHA135d932e2a1992f1b25f7ce7ff78d0e4df821df83
SHA25616a70c7f6d0bafeceae92d28552bea11be80cfbe5c127adae5be45079178ea58
SHA51200c01feb797e6a66e2611e22473938ba82250cfff7b736892127afd6d850f38edf60964d5d808e304385f8b9036b1aa1d46cf35a7bcc0e2e5ddce49932f272e7
-
Filesize
5KB
MD564cc3fcafdb5411297d99e3828012cd1
SHA1ba97a8b722faf501db0bbcc41b0459a38ce98f41
SHA2566b8f640000f37de40deacd3b32f8db5b6c02f6859d93b9725100fd30283ac3d2
SHA512a99f898e12715815430b9ee639ae13e30555c2138ee7915116ad419a77ea37090a6c4172bea4656bd3ad02ea117d76eed04ceed0695e9f4be121c24bb0c5a2c7
-
Filesize
5KB
MD595b2cdf9e90950e8911432fe0e107324
SHA16807b36954eb87753190e72031d9521c660e5261
SHA256bde7e06ef652347b5b06a1a337ee690db1cd46d0ec0328a6021ca7bd7e2a2842
SHA512c872578683fb67b5b1f8aba9b3260a368da5acfdb0939334fefe729ea290a4ddf752915dda01c61e9f9315ac4c283d0a7a01f9a14e707c7d43aaa943572bc01c
-
Filesize
6KB
MD5dbc5be06c1a29e8629e32d79c0fd89e8
SHA12af0e7bd824f1e3c776b7a1cf849de62d9d14ad7
SHA2563b4c629968062e9d025a4877647401673d481f6c3380dba38def81e9e1f1f1e4
SHA5122169183de7ea51ce1c6509f3ab6b014c1fb0d68dfddca6726f82bf1d68ce03f649799b75b285025cd7d539b089ba6eaedabca33aa57e6e1fcd0fa137f35d5d4d
-
Filesize
159KB
MD5377578dc8409e6a7c257e88c63a22276
SHA1f90d52767022e4269e4adaf989f63e08aef8ec00
SHA25632fa326049f1b4a9b3d4f9c6e6f6fded5fc83fdc1f55ed7362cbbd19e926b011
SHA5125fe1704ef65426a0874da31267bb5e0286f8a0b35bc4899c9d7101ae9b821fee0974cfc5750c68c1f53500126e41add225f4edb4598ebb1c6891720a717dd1c9
-
Filesize
159KB
MD542910ca4667a82b28bef349a2817238a
SHA19c1be53a868078a0f9711e9d895244a8d6606ba3
SHA2560bf6b1723467adbb1654e6c9f0505ca9083acc925c1148bb550649f47aecf5e1
SHA512094b6ec98b0f0e0535ba5c252701525c2f3a5adf3507419ae39e9f953873dcf5fb61107cddaf02d89562d6e1dfd0a502ffe3c8a0b07be4ca760b9dade4559a02
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd