Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
06/07/2023, 20:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://indd.adobe.com/view/1b49455a-c72c-4f8d-a733-c2c2e8410f64
Resource
win10-20230703-en
General
-
Target
https://indd.adobe.com/view/1b49455a-c72c-4f8d-a733-c2c2e8410f64
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133331479262553339" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4340 chrome.exe 4340 chrome.exe 4172 chrome.exe 4172 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe Token: SeShutdownPrivilege 4340 chrome.exe Token: SeCreatePagefilePrivilege 4340 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4340 wrote to memory of 4824 4340 chrome.exe 70 PID 4340 wrote to memory of 4824 4340 chrome.exe 70 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 4444 4340 chrome.exe 73 PID 4340 wrote to memory of 3368 4340 chrome.exe 72 PID 4340 wrote to memory of 3368 4340 chrome.exe 72 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74 PID 4340 wrote to memory of 4372 4340 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://indd.adobe.com/view/1b49455a-c72c-4f8d-a733-c2c2e8410f641⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffdc6189758,0x7ffdc6189768,0x7ffdc61897782⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1996 --field-trial-handle=1604,i,6484032412061224901,6667887437151497782,131072 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1604,i,6484032412061224901,6667887437151497782,131072 /prefetch:22⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1604,i,6484032412061224901,6667887437151497782,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1604,i,6484032412061224901,6667887437151497782,131072 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1604,i,6484032412061224901,6667887437151497782,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1604,i,6484032412061224901,6667887437151497782,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4840 --field-trial-handle=1604,i,6484032412061224901,6667887437151497782,131072 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1604,i,6484032412061224901,6667887437151497782,131072 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5100 --field-trial-handle=1604,i,6484032412061224901,6667887437151497782,131072 /prefetch:12⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5156 --field-trial-handle=1604,i,6484032412061224901,6667887437151497782,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5a785bc989960d6dffa96966c4279dbb2
SHA15434f479314c50a7ac1e9a8fb4dd96301a0d9e85
SHA2568d92f915100fa141f50da26017cd8e39e5de2c0a54966030b8fc3826a65ff469
SHA51291fff348d12792fb5bd885bd28479e801b45cfce524b3237c027532f80172adeb7401e243ee718a81529b6cad3378634542d60de6987c608bd28bbfe6be4d18d
-
Filesize
2KB
MD5821e960b5ffce4a99e7fc20b310f62fa
SHA19a0c34098e556ea4ca62e2a7abe5a5d57156934c
SHA256e09b165ff8c5510c8b1c58c3560a9ce39e6f0171dfab309c9060195146472382
SHA512a4d78970e61ae1a8bfeeda52f791ddb027c12f4ca5e4d74de2412ae8d90452246905ba0d040a1f40c5126ea0f86cd52189ea140bb78d79cc5d090f183f53114e
-
Filesize
2KB
MD5adaa7485e13d176546b70dff8d4b267c
SHA158ccc5f27d3c57c697b94c8fcfc22fb772cdb78b
SHA256e08661e01cdfb28ae7ea084e5e7bf5b07e3b11166374e944163a9007071a24a0
SHA51230d17f61a7d5ca68ca4da3590968e7d0d51f5b0dbbde5b4c83471d700203a56ffa83900db588fd24114032369ca3175af214fb894fcaba41aa14f71c58454637
-
Filesize
1KB
MD5ea37af987c7739fd65853bf39421ef65
SHA1a7829f8ad82719fdaa567a6f4ef9118481055086
SHA2561837f1c7435cc89d2e3d0cc51081536c2794ccb67b8de4856f0f23bcf81e6383
SHA5127d95289b624e239e844519ef08d4642a5d28674c9f66c3e352050c930c607582b1a59d272317d983696d2c17c32d8d572b3a4b641046bef51d30d93d910e6aac
-
Filesize
5KB
MD50b5630a485995cd3e250e1364662429d
SHA16c13140b59503b32b6290d63e946816cffff6ba8
SHA2567af2c4400898de296956f5637e6b8f5cbd20309fdf2500908daace9de8018161
SHA512cb46eff8235caa566abc15063a3549e9bb881b9e0808c9eda9e4cff2e69970842cad074740c57111151836c986cad2ebf4349805fbcc50331948a1c2dab367ba
-
Filesize
5KB
MD59370ae85ea2e3e78b09619d690c8fec4
SHA1659d1b123e180f419daa0bc8da5270391f72e0d1
SHA2561adb6dbdb898d37d4150a3e9cc77c970ec6a7fddc6c055d92dd3fbac249b1181
SHA5126ef90ac492b7421d643fccc42fc0f7527878b04a48b6a1bf4905f21970c924a8708c2ecab809d42a5586238a376c6d6598a2ff5a5810dad44f7251b5ad2fa91d
-
Filesize
6KB
MD5946f8db85fd15ecb83a6bb3eb4d5b5f5
SHA187b202c598969a723893dc7f5e6230fc33bc95c5
SHA25622aa2c14844f3694e631b3ba765fcb1e5e09b1a5ba52cb031c6ddf51261a1066
SHA5129c0659846d88c6cbce4d0d34208a5c7042b3c6bf48ca65de3eef60cd4646c27ac48467c9e94aee6b8ee0e62df4eacf2a2b51a38a24d8bc7ded787b0cee727b77
-
Filesize
12KB
MD527a6efa38d3c19431f70dd8d9c33fa0b
SHA1da4fb55be91ac1b4c4ed82c9b762057b76c21a11
SHA2560158f23f97b03e8bb44ba033c29d99705c53a6727522ff22f0573d76f8a6e538
SHA5127949d7f7b7cdb2b9f44beff98ddbf4d666c7a3d248cf3b3a9b4feb94aa36a64235d370459e9614563f60413a969a0f99d3bcebd4cbc2e6b89969573f9294c962
-
Filesize
171KB
MD58600aad91a3fe9a8e8ec7fc5b354ef15
SHA1fc9d895398bd311f1b7de51a307dce052135b611
SHA2560034471d45fd728e7ea33a7a272e10fe6e48bdc2cdfc0bf38f2f05d564205618
SHA512fd59054ea54dece6aa60c0cf9a6e45e03e26e922d5395b74c88a1b5b0365ae17f24d83c4dc17a5ba9e25f62a5a11958f31a96c266e353f96f2467ab08b68acc3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd