Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2023, 16:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://imagemed.univ-rennes1.fr/en/mrquantif/download.php
Resource
win10v2004-20230621-en
General
-
Target
https://imagemed.univ-rennes1.fr/en/mrquantif/download.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133323577588058553" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 540 chrome.exe 540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe Token: SeShutdownPrivilege 540 chrome.exe Token: SeCreatePagefilePrivilege 540 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 540 wrote to memory of 2340 540 chrome.exe 81 PID 540 wrote to memory of 2340 540 chrome.exe 81 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 2584 540 chrome.exe 83 PID 540 wrote to memory of 3164 540 chrome.exe 84 PID 540 wrote to memory of 3164 540 chrome.exe 84 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85 PID 540 wrote to memory of 3364 540 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://imagemed.univ-rennes1.fr/en/mrquantif/download.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd38529758,0x7ffd38529768,0x7ffd385297782⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1768,i,13207197420104122929,17307578543833931093,131072 /prefetch:22⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1768,i,13207197420104122929,17307578543833931093,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1768,i,13207197420104122929,17307578543833931093,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1768,i,13207197420104122929,17307578543833931093,131072 /prefetch:12⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3220 --field-trial-handle=1768,i,13207197420104122929,17307578543833931093,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5140 --field-trial-handle=1768,i,13207197420104122929,17307578543833931093,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1768,i,13207197420104122929,17307578543833931093,131072 /prefetch:82⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1768,i,13207197420104122929,17307578543833931093,131072 /prefetch:82⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2432 --field-trial-handle=1768,i,13207197420104122929,17307578543833931093,131072 /prefetch:12⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\46198846-4a22-4768-a4f4-09b9fa2a3888.tmp
Filesize6KB
MD511f6f961b51a862ca25eeea7ff60c74e
SHA1a9c38986a080b59b8da6fcf0588ba48b78f1d0f8
SHA2561359dcf407c49e0c9d893db2f84a1ac1ec637d83780f6dadbfa020e585eafda6
SHA512f52deeb65f8ddd44bbe6e2baf718ac9f18534fda112b701060ef1bd18af1a6e4826bf8c5792847a339e29ea865334cb9dc7293ab28d5dbfca221f65e84d45a22
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7b1345b9-ba29-4de3-96b0-ead48784bb8f.tmp
Filesize6KB
MD51d63371908d96ed4f30670ab051d7b75
SHA183fb28d4c16e868836760e2ce198fb54592f6d3c
SHA2560a8cdfe43baa29ae71e539051bcb14dc8f05436a6b474052e51f3a1efc531a36
SHA512cafc8954eb5f77be4cc2b39440e8aeb85f1c909bd8f3c4b1b8ede26dcbc527a723f138f4d888f8974a07f4414233eadb67da0e25c9e06bc57894f27abf990bd0
-
Filesize
1KB
MD508eb746227ba5ce35550efedb1683632
SHA1c661c5448c793c15f8796d7ce238f87305f6011b
SHA2563d9bc091e8cfdaf2ddef02724e07c6ecc619d682b5142be9ade56239d4fda5a1
SHA5120aa7358096bfa2a2a5a5de0cd563ba6a3a0c3e8b4fd2d94e01776c58312407f212ab321c8903b2ffb5ad00d60a71e1e090026d96678fb6000c6429de7b9a90d6
-
Filesize
2KB
MD59ece09d04a064c1dae02594592fc563b
SHA11aa464a24f22b0f62d9ba1056e3d79e7f507a2f1
SHA256ae08744d83f0680d2f6ed74516c6374917103bff986faba442e56672f854a9cc
SHA512a682c77394a9b6c9f2376fa905d484f8a1c92983cf84d6c82ad1b8e0a3d9c25150dcf4e0a7dc78cdcabaf787d8f615f39a6d9f8f5f041c6994215a5b73ab469e
-
Filesize
1KB
MD52db92a1f4d216954693890662c0d77c8
SHA1b6852b72720663141a8f611a33d04f8290508df4
SHA2567221cb69aa78bffafe5af50f42adfa720436d8bf7c46a3c1668ce5d8dfa2d38e
SHA5127f9d90f840e40f68eecfe38076c124f7a3be303e1c1d548b939ecd0f383e33a79321c680e8fa4840c8ce575361f0fb6b4bc1bfb87919dd7d28a0132e769cd46b
-
Filesize
6KB
MD5fe12466a0e8494d6b09be3dac0bdc3de
SHA1f3610a936b764e497a85ab87b38e4113499ed1c8
SHA256c17deeb0d5472a5b364422d32b43951274a686e0ebc21e261d45f78b5e098f70
SHA512d235800bf67c40555fbf73270d8b3fba56a98c6abce1e425e1a07c871bba9aa7d07866aeb7162e1d33d926ad4d5c44c3ea57d5d2fe53b6a32c2be198464e69c4
-
Filesize
6KB
MD58501a9e79edfa7ef4ca34f86c61625a9
SHA16ea95fef4d7876df90e53dc9da460435921f2903
SHA256fdc69a0b6fb4848958b088747d3f76f7538f081d5987a7dd72ba0882b9f75ce2
SHA5124f808dd73267e465a81a610098d9e72a2b83dfd46b7c536b80bb511da1d1fb00a1a734598a54009aad474d88d66fb8e909736879be418356a664cdce1fbc39b0
-
Filesize
15KB
MD5f2ff6eb277643ed56b1d8c8cb2068607
SHA14673a5f7b987b5cd1e7e36d654adfdd62640c979
SHA256e86d835219f9e9274d6249797ab007d2ebbb33e2ca9b081c7ff464d9fc12cbf0
SHA5120c36cf444d9dcad9c4c75dc4c7946a9d889d0cba7d06cfe633db96ba25904e50f8b46ecbf7a5e0ba1575fa58884ea12c4c4e352785bca7162181f1ea3a134d07
-
Filesize
15KB
MD5c3f2771432fa29f3ac88b7f6744f7ed8
SHA185b37e60cc0a45a5b48f31484ccd33e5fab2c5af
SHA256dd953d8347c11d825f0f27b3493ddd8b762ba9e306c568a8b190122ed2ad62a0
SHA51273f60614bb8697e2d27b6d4f02b77cb21e7047c8a4a3cfc4129ccdb66be4d3588eaeee6b0e28f5132eb8b9edf5e6516b3f615def606a64897b7ab16f0b8cef76
-
Filesize
174KB
MD51fffe0b8756b4a9c0c205422946379f1
SHA11f39cbb6b26603d54bfd9c4d2b94b1c1426fc93e
SHA2563bf4e0af335947d624f3b67139d2dd1e43314727ec3e104b05fafa2bdef42d42
SHA5124f02e40a19af28b6313d1710d79e298a3ef9cf4828c9963eb36c46d43db59e0648f1279c785e7b852055b987c1fcb22bfce381d7b7669172490b3047c4194fce
-
Filesize
174KB
MD56af8ad8aa3d0fe09b1002af2abdbcb6e
SHA170ffd9fb49804d001c0acdb2b5e8517d976cf660
SHA256b09b7668f2920267c78df4698efb54154b01e8f77df3abb15e4bc1411ec1588f
SHA5120398428a9ad98bb6df31c8d53d9e796e584a5a39a43b6f0a2494b535500a40ab9de3c982c2fd77b5cb8bfaf3e5ba7385db5f70951490f45d38178245fe49b5de
-
Filesize
174KB
MD56c727d5c4250502a7eb86d90dcabac06
SHA10e7d2c74e842acc2c6e80e4ca4e60c989abbb758
SHA2564dea446e66e73389631ecbcb8fb244d8ff9ea150422192c08c721b511c4e2bfd
SHA51285f66881287ae58bc2457ac2fba3c93055ad678c46b568d994d2630f36bb972f423b1416d4d60816616b83447af8c90a1ec805fe42cd47ade130fd27e46557c5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd