Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
15s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
04/07/2023, 21:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.jgplattroger.com
Resource
win10-20230703-en
General
-
Target
http://www.jgplattroger.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133329787695602594" chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5116 chrome.exe 5116 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe Token: SeShutdownPrivilege 5116 chrome.exe Token: SeCreatePagefilePrivilege 5116 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5116 wrote to memory of 2948 5116 chrome.exe 70 PID 5116 wrote to memory of 2948 5116 chrome.exe 70 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 3792 5116 chrome.exe 75 PID 5116 wrote to memory of 2252 5116 chrome.exe 72 PID 5116 wrote to memory of 2252 5116 chrome.exe 72 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74 PID 5116 wrote to memory of 2960 5116 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.jgplattroger.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc97379758,0x7ffc97379768,0x7ffc973797782⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1828,i,18001168681424290303,641317468027003849,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2632 --field-trial-handle=1828,i,18001168681424290303,641317468027003849,131072 /prefetch:12⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1828,i,18001168681424290303,641317468027003849,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1828,i,18001168681424290303,641317468027003849,131072 /prefetch:22⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2636 --field-trial-handle=1828,i,18001168681424290303,641317468027003849,131072 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1828,i,18001168681424290303,641317468027003849,131072 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4640 --field-trial-handle=1828,i,18001168681424290303,641317468027003849,131072 /prefetch:82⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1828,i,18001168681424290303,641317468027003849,131072 /prefetch:82⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:428
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5591c5299654e6e8cccfa0272ff8551b0
SHA1463539d83862e37f8ff3e4a7e1c98a5eca2a8902
SHA256cd3b0ea643053f6ca4f08950d46338f298907f51280f76cc9e30a230f8fb271d
SHA5129efa585ca797a18f9087e85a72bb4b2c993f5456dc60b74295b1d1814009614912c3921172034dcc9617d9e56c3f535cd36f9ef1debb7cce150acdb624a7a96b
-
Filesize
12KB
MD546f7e6e1bb5f50f0858a4541465930f3
SHA17fa23eeada0e975c10d86b60e96f4f6786691659
SHA25648b1da37d5e68fc605bf71efda84f29437acec6eeef035a6d26247d1c2b1304f
SHA512e56b867079a3e76c751cc2fac0c29d99bd464c017b529031e4a87965e434007c4496480b9393fe51dabfdc3b1be5cededa3a81465138090fdf1843f224be0dfb
-
Filesize
87KB
MD548c0c015867e385d552641b96052cb90
SHA101e88e68684fe5334c09207f086652d892ae80b8
SHA256bf2c2d49c8c87c6086777396281aee78498a79a734029256729c6cb0a60037a3
SHA512daf6966ca94d4740c2d5197da43e6b975cdab87ff69ceb08f48cae988277759a70085da868026ba32d9213799d7f09863d117974f0a3854617dada4bb918802b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd