Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 11:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ogaroma.com
Resource
win10v2004-20230703-en
General
-
Target
http://ogaroma.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3768 chrome.exe 3768 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe Token: SeShutdownPrivilege 3768 chrome.exe Token: SeCreatePagefilePrivilege 3768 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe 3768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3768 wrote to memory of 3712 3768 chrome.exe 79 PID 3768 wrote to memory of 3712 3768 chrome.exe 79 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 1924 3768 chrome.exe 81 PID 3768 wrote to memory of 2372 3768 chrome.exe 82 PID 3768 wrote to memory of 2372 3768 chrome.exe 82 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83 PID 3768 wrote to memory of 4396 3768 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://ogaroma.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde4119758,0x7ffde4119768,0x7ffde41197782⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1852,i,6816857946109594014,14709258970512640149,131072 /prefetch:22⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1852,i,6816857946109594014,14709258970512640149,131072 /prefetch:82⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 --field-trial-handle=1852,i,6816857946109594014,14709258970512640149,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3160 --field-trial-handle=1852,i,6816857946109594014,14709258970512640149,131072 /prefetch:12⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1852,i,6816857946109594014,14709258970512640149,131072 /prefetch:12⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4612 --field-trial-handle=1852,i,6816857946109594014,14709258970512640149,131072 /prefetch:12⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4872 --field-trial-handle=1852,i,6816857946109594014,14709258970512640149,131072 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 --field-trial-handle=1852,i,6816857946109594014,14709258970512640149,131072 /prefetch:82⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3920 --field-trial-handle=1852,i,6816857946109594014,14709258970512640149,131072 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4724 --field-trial-handle=1852,i,6816857946109594014,14709258970512640149,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD58f7df7bafb5bd4858fcf2690b72e6c1c
SHA1b7fdc7d12bec08fe6ecf9b75ee409a584b402304
SHA256e1d998d6b4a784283268f659f853939300899da4023a9df2ed881a5bb1ad565a
SHA512b7d26f5fa028bc377ba40e0688ed3afc52613b4f9dbe8339c94cff4f3d8ea896369c73ff3d39e8c60f597dc02bf0d3c2fbae52bee0dab52a3dc0ec61cd66abf2
-
Filesize
1KB
MD5ec60a9a91348368c93ea2297006b4eea
SHA1b0021974fcb4e3fddbe2eb8d73438609f93a4c44
SHA256c85b31c42b4854e7f876271047b9eaec8ccb3b3b5057e4b0742a5d76dc5e4754
SHA512114e46ba80d4555e9b25eb6589ace1e649da5a23b0bceaab912c582b7c326d5e9b5cf47b2e10c1ae5fae4ceadd69d4a654e655318eaaf2d048ec8fd8ff86defe
-
Filesize
874B
MD52dfae40403240717fc303ed27ae52a5f
SHA189758c577421877e08c0b62fb49751b3efc5a0d9
SHA256205c6aaba92f5d2a769a20f96a1170d93c9fcc0a5f0aab582832de8801587089
SHA512717f68afcc8f6ab917c6915d14ad302bd3207d2bd8c9840f21bc119e1234ebb66aaae6e481f90850e5ca0a228a617c94ef206c66387e1ad58213a60a8de7ba42
-
Filesize
5KB
MD56581071f844f4c02b40cffad11227114
SHA1f664636a661118a2d541beb58e5469464e25b9bb
SHA25626d668dbcfe5766c6572e013b0eca4bed521d06787bebff0ca536f0ccf491834
SHA5125ee935a7f1287199d3c9c89074c669321cfaa1388c684899417f67d5e4560842668ee000539b33d5eaef6c1b35feb7fe9b3f245c43fb30cc9907359aaca86888
-
Filesize
5KB
MD5894f78ddba6e8730bdc64991fbe920e0
SHA114fa70d53fc328a2584a058f45c8bf969e3373ac
SHA2567e181ab6b4cf9a4b38304cd141ae1af8e67367c00a6a8754b77aa67ecdb9640b
SHA512925caf328dcf45c60e8cecef3be2ec488d5758eaad97e35435a00910d8f0257fb91500b077a2578c126226745b8e4e36be875467282049dd8ea3a7f3b710fcfb
-
Filesize
6KB
MD5c1cbd33eec8f6af66f0b1d8025a7b2b0
SHA1155294a53e3783e45f3710c2e5d92cc839adb2b6
SHA256468a87210371140dbf45d90da9e8e6ffefe6b3a263c657eb6d368f7e438a78e7
SHA512b01bf1b8f386e6366bf68974188d3e026d6bdbf3a665ec9f4ed7634a1ab8c1f946cac52db54b6e264e0b836f0df44ce0e986ea14c12c4e0bb02317698ace0c0f
-
Filesize
171KB
MD5b1cdbd93968dc9248b0e51e1933884af
SHA1aa70b7a72ae1c81385c6e348be664285e931ad0b
SHA256068df5d2b46f49a3b84a0eac5ee65222ed493cf4892e8ce48f4e7e636d33a00d
SHA5120fb1e4957f22a77b477783db72b8ca70531ac998f725131dc9dcac3b28ee826ae8eafb8e06607b34c9e2ad0ff0856c5cec0b602459eb3e28528978a57a0d74df
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd