Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 08:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://childrensservicesof-my.sharepoint.com/:b:/r/personal/jquintanilla_csrox_org/Documents/Behavioral%20Health.pdf?e=4%3a3cf61d2f1a264feca1a7e8f050feb54a&web=1&at=9
Resource
win10v2004-20230621-en
General
-
Target
https://childrensservicesof-my.sharepoint.com/:b:/r/personal/jquintanilla_csrox_org/Documents/Behavioral%20Health.pdf?e=4%3a3cf61d2f1a264feca1a7e8f050feb54a&web=1&at=9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133325889372460319" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2572 chrome.exe 2572 chrome.exe 2260 chrome.exe 2260 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe Token: SeShutdownPrivilege 2572 chrome.exe Token: SeCreatePagefilePrivilege 2572 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe 2572 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2572 wrote to memory of 1544 2572 chrome.exe 85 PID 2572 wrote to memory of 1544 2572 chrome.exe 85 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 2724 2572 chrome.exe 86 PID 2572 wrote to memory of 3624 2572 chrome.exe 87 PID 2572 wrote to memory of 3624 2572 chrome.exe 87 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88 PID 2572 wrote to memory of 4440 2572 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://childrensservicesof-my.sharepoint.com/:b:/r/personal/jquintanilla_csrox_org/Documents/Behavioral%20Health.pdf?e=4%3a3cf61d2f1a264feca1a7e8f050feb54a&web=1&at=91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffada269758,0x7ffada269768,0x7ffada2697782⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1796,i,9658412143748045886,15029868430150875249,131072 /prefetch:22⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1796,i,9658412143748045886,15029868430150875249,131072 /prefetch:82⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1796,i,9658412143748045886,15029868430150875249,131072 /prefetch:82⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1796,i,9658412143748045886,15029868430150875249,131072 /prefetch:12⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1796,i,9658412143748045886,15029868430150875249,131072 /prefetch:12⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4508 --field-trial-handle=1796,i,9658412143748045886,15029868430150875249,131072 /prefetch:12⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1796,i,9658412143748045886,15029868430150875249,131072 /prefetch:82⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4856 --field-trial-handle=1796,i,9658412143748045886,15029868430150875249,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1796,i,9658412143748045886,15029868430150875249,131072 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2588 --field-trial-handle=1796,i,9658412143748045886,15029868430150875249,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5323fe8c57b96aa0f12656ea8c6ea7fee
SHA1aa6aec725a7f7aa2f5443b4e0f1a6f4629bc7cc5
SHA2565b886a66e4bb1f3c9d47fcff0d23b4ae0dcc03fc920ae267002fe053ea862614
SHA512264b0ed58f249b883600a161d770667a0568db915c97295698ed35c20a2b5dd4a385f37cd0b5ce94b68efe9926f48a7341bc1dbf081a5462e2140a1517da18fc
-
Filesize
2KB
MD5bfb01767efa9b576adb23c5dd09e18ff
SHA117ae8f88352283fa1fc161f0d7a3bf791bc349ca
SHA256d5832ec103b77ea94901ab054179313f54a2e8e125c3d979057d879f5bb4dcb1
SHA512f3ccbe3a4bef84e2dc9d3f2ac5a5818bfe1e2896d2b3a1e42bfebfef5590205ff1bc4ab259f3f76bf60b6a92ddbe0c09c1331db2415e2a7190cbe52614417e4d
-
Filesize
1KB
MD5156c8f0626ec3fce15ff0b32c1524b87
SHA19a131ce5304cb060b6c0b265f02f5386565738b8
SHA2569ea928fee109ec49ef1cb89e1b304d39e5c01440aca0ce5cc3a203e876fea690
SHA51272e81ad4078a6f25d7a05ed9147ad3e7ffc072084ef344cd1079c0b36c1c0d9097078e6f5a80682754396b22609bf83ff60fc04721f814cc63a87f5d8a6a698e
-
Filesize
874B
MD5fc8df1f247a1c3c8eb6dcbbd78a3a866
SHA16cc6306bb1fa04a1ed4a588ca03cd803a9ad3fb1
SHA25672ca7a4b959f625eca38fb57f8f0c04887bcf23b2b87404342d7de352cbc227d
SHA512e2189e43a53b9f9d404b3d5836d9193469ab0c0bfdeac7fe7dbfb9c5602bd04377ce6ecd6cda3ce6ee7d05aa4ce515b0659942f822ea4a58e122a362d2a3f6a0
-
Filesize
6KB
MD58d3f00dd85b42995867278b279a5425a
SHA1012bf9f1e2547d7ffe99e041fe3c35e088830b14
SHA25676541dcbf85e6fd9aea8095fa6b7c37679dc55cb250a0a048e4d53d07b3e9faf
SHA5120a7529856d9c780a933597f7f1a2bfcc92848222ce81d3668e4458a1b44ce87e1b16a232afdd1c312461a95c5246f1d11364d637a11fd239aa70a136aa6417ad
-
Filesize
15KB
MD5e88d7917308b7aa986a0c3e0825d5519
SHA14b11e327ed6801d4e57caa9364c8ea9435a2c17b
SHA256a3f4e0f81cf8b56a95c42b1938b8e34ec45c3ec5e05e8b5c5885e89868284271
SHA5126c1d20b817b9c9744626f75c492f581d8f66e73f212d8427a9de4c99f83ba5e82a541c1f859ffa3954893c63bfca67c3dcb72a989fc7df799f8e5bc4f43e591f
-
Filesize
172KB
MD58c370619fb16c1adce5bec7242372c43
SHA11cc9fb0857848dbb07180823598633281abd36fc
SHA2565916e69a5b1a7db19258366dfae6ee80a2118a787f9038d54c225c6852a1b067
SHA512f183a46fa82e09b8f6ca4038e2d102cf117c7cf554d9d6d88967ea21e3a0b1360017864ae53af6001c330a5da9db07a2d6b015a72f33b9489910ff0be457acc7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd