Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 14:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://7fdghhoo1.top
Resource
win10v2004-20230621-en
General
-
Target
http://7fdghhoo1.top
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133329528261669272" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 4332 chrome.exe 4332 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 3444 3912 chrome.exe 85 PID 3912 wrote to memory of 3444 3912 chrome.exe 85 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4936 3912 chrome.exe 86 PID 3912 wrote to memory of 4268 3912 chrome.exe 87 PID 3912 wrote to memory of 4268 3912 chrome.exe 87 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88 PID 3912 wrote to memory of 3580 3912 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://7fdghhoo1.top1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff8d7a49758,0x7ff8d7a49768,0x7ff8d7a497782⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1876,i,16177840861595829148,3537432094452773747,131072 /prefetch:22⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1876,i,16177840861595829148,3537432094452773747,131072 /prefetch:82⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1876,i,16177840861595829148,3537432094452773747,131072 /prefetch:82⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1876,i,16177840861595829148,3537432094452773747,131072 /prefetch:12⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1876,i,16177840861595829148,3537432094452773747,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1876,i,16177840861595829148,3537432094452773747,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4768 --field-trial-handle=1876,i,16177840861595829148,3537432094452773747,131072 /prefetch:82⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1876,i,16177840861595829148,3537432094452773747,131072 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4920 --field-trial-handle=1876,i,16177840861595829148,3537432094452773747,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c59a5c91881b55f1f05f9c8ada17c7a8
SHA1142831a25ed953e21f34d8f365fa2d117a20e9a4
SHA256494befea5d589c58f12630029d336e283447441b7ea2546fb0d73f0193dccf8d
SHA512b991e904aac9018b7746a05298d1e4fbdfa85979bc772ed808c32bd98c0504ac308555f2130c743e27272979373c26d9e8df9d7607ec3a579e2acdca1486d7fa
-
Filesize
6KB
MD5b07327a0fbaa813474164d3b5fbb2425
SHA18175d1cd3806f625ec8314598ec62c7be192623e
SHA2564262ad04e7254d2bca43d6a19fc56baa550814d153f6c1fc4ae604c05136df59
SHA512cd36e05fe9ea3fef3a32d72b4a1dc5af9bb6cd2491e7fb0b406486f289d0289f9255d068b325074ff8726ea7a1fdf519d4d323e697424e21b49f29665054336a
-
Filesize
15KB
MD5cb04b676e6e34b4f97d9fdd2e3d3c10b
SHA182f20ea86f4c8258925f8240f21aef032e4ded3c
SHA256a4fc4bbdb03e656cce523e17279a18f3b4ba4e125bb13bf463ac9940be588457
SHA512ab83c07eb0b6e1be608c6604b772697dc3bae225b7c52978cf2e5ea34f6c68518110e79891e7f0e8ec1d1ef9d476ad5f134dcb5a73dcbd093ac0e6468fc82cb3
-
Filesize
172KB
MD5172f4fc4f5d9858be27b8b342b65284e
SHA12700a6df514b8402423a2e15055bdaab3e58dc92
SHA256ddbccaeac3eff2fce73e7061b1ad26021d8e4f36f8bfb11256ac5472eef977e9
SHA512cbfff9a2a211ac6c1b0a6edd3ef934b19efdd1df8808c731afcf767a3cf86878aa375c4f613c479edb5a417a1fcf3dd5319df6e794efabeef72602ef2f5d9fd8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd