Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
3JT6-VXDQ6L-JOY1.htm
Resource
win10v2004-20230703-en
General
-
Target
3JT6-VXDQ6L-JOY1.htm
-
Size
2KB
-
MD5
0c6dd781e86aac33013e83ac024ccb41
-
SHA1
e5f41c939215ab4a45d5d871d58492b8c786a1ce
-
SHA256
4d706f29d0b38b40b0f0cfc2b84f49677beb0d9773247aed0cb029ff8a987774
-
SHA512
cbae2bc498bb69c1d00a221a77471d869eb4aae81d678d79497a71decfd95a99e2c5c4ffc871bc2dbec522525acb19dc5e10766624e0795e6a456104f93597a1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 116 3012 chrome.exe 80 PID 3012 wrote to memory of 116 3012 chrome.exe 80 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4288 3012 chrome.exe 82 PID 3012 wrote to memory of 4192 3012 chrome.exe 83 PID 3012 wrote to memory of 4192 3012 chrome.exe 83 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84 PID 3012 wrote to memory of 4036 3012 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\3JT6-VXDQ6L-JOY1.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeeb8a9758,0x7ffeeb8a9768,0x7ffeeb8a97782⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1832,i,3094130417666499829,1744569208311476328,131072 /prefetch:22⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1832,i,3094130417666499829,1744569208311476328,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1832,i,3094130417666499829,1744569208311476328,131072 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3128 --field-trial-handle=1832,i,3094130417666499829,1744569208311476328,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1832,i,3094130417666499829,1744569208311476328,131072 /prefetch:12⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4864 --field-trial-handle=1832,i,3094130417666499829,1744569208311476328,131072 /prefetch:12⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1832,i,3094130417666499829,1744569208311476328,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 --field-trial-handle=1832,i,3094130417666499829,1744569208311476328,131072 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD5e7c0965698809d98184345c700d7d37f
SHA173a87ad0b97634967f82d2c2f82a7de172aa028c
SHA256ca5e73639b6a255554f6e50928e9a330058109b0bba49a626aabf1ed2c06bb53
SHA5128eee58cbf40ec07f3a04877f4963c113c1b5e764440947e9b157f52e6ee6a5b9fd63f31c06418835bd2b01697752cf25a43bf9b5904e042c11aab0b670e4c633
-
Filesize
5KB
MD567e33a82b4bb66150dabbd2ea9cc2ae9
SHA1b434df95165ad7cea7f2aafc400cb23cd7f5e46b
SHA256073f9f028b11d8519a1d9585eba55fe7e656919f9803a04f1fea99580914487d
SHA51220dbc346454483c8fabb32a9a26dc1071ec74cb1547efaa597b6be7e2a7fbbb22078f7d220baccb3647ff21f7759005f899fdb649c9ccbe39a51568661dbdecb
-
Filesize
171KB
MD5ed2f6491b2322f8266665d00bfd3390b
SHA1fb9b12ae55af075505c2e4bfcc0f0c8d59b369a8
SHA256a40a29557fb21bd1891eb8c85a21b8eae8325ea525c9a1ba8d5afc1124400951
SHA512906224df936dc3a1675baec651fc9c48de524cb6ac28adb0f223953136fc3f8bb94dfb61024e918229f733197688faf2f37312f48c4779920779117b1807be09
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd