Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
488s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2023, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
ATT00002.htm
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ATT00002.htm
Resource
win10v2004-20230703-en
General
-
Target
ATT00002.htm
-
Size
852B
-
MD5
e797544b73c11094820d02517a03e7e6
-
SHA1
53c26880ac8bcf06287c5076448a6293906e6155
-
SHA256
ffa29720931f706c5f2d805f483230c7d4082922f6089838d1cb9bae6d1021f7
-
SHA512
6ac646c50cbdc10e825e04234852025b27940924a821a55bfdf5f0f3471b38b1efa303857b0a480abf4080b78dd7cfd0a20207a87d37a348e379aaac6f5839fc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3212 chrome.exe 3212 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3212 chrome.exe 3212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3212 wrote to memory of 2516 3212 chrome.exe 84 PID 3212 wrote to memory of 2516 3212 chrome.exe 84 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 2956 3212 chrome.exe 86 PID 3212 wrote to memory of 1604 3212 chrome.exe 87 PID 3212 wrote to memory of 1604 3212 chrome.exe 87 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88 PID 3212 wrote to memory of 4756 3212 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\ATT00002.htm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa21669758,0x7ffa21669768,0x7ffa216697782⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1888,i,13219790306761169513,4912991298994026329,131072 /prefetch:22⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1888,i,13219790306761169513,4912991298994026329,131072 /prefetch:82⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1888,i,13219790306761169513,4912991298994026329,131072 /prefetch:82⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1888,i,13219790306761169513,4912991298994026329,131072 /prefetch:12⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1888,i,13219790306761169513,4912991298994026329,131072 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1888,i,13219790306761169513,4912991298994026329,131072 /prefetch:82⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4940 --field-trial-handle=1888,i,13219790306761169513,4912991298994026329,131072 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1888,i,13219790306761169513,4912991298994026329,131072 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3904 --field-trial-handle=1888,i,13219790306761169513,4912991298994026329,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4e036caa-1647-4bbf-ad69-80dc984f0b8d.tmp
Filesize6KB
MD5543e6b2ae346863621975eeb2c4f2bdb
SHA18fe00ae246f67aaff91792423ea43189e9fffe1f
SHA256d5f297fa127e4e2601067309df89c4d165ac92d27f6eadab1f4f2cccdb7f0303
SHA512b1aa25cb6c210cf4edf0d38a5ed5a990328347cb2c04472e88d0bfeda5d3b5dd17b9190024579cab23c339023a2b1006fb3cdcfaa852a1bbd9b8515ceaaf2522
-
Filesize
1KB
MD5ef396b7a5ed5054427774e328a2e648e
SHA1ec13bb57ce8f02ee33aac6b29b251caf98ef2975
SHA2569c52b9ab3e3cb00967adc074fdf717a51dad805e96afe50e22b36f2c702c1f39
SHA51221795671e94a57cc94b67f2f33ada9d37836855a4542a5f5ce8573b810855c17db97203a5b37cf3f20281e3485bf88f06ae7f26f141e9f39ca5ab604fe9e6f70
-
Filesize
6KB
MD5c08648bb1886fea3ae707a2a294c0336
SHA160cd0cda36144a1ddd939fa1d8603bbd53e882eb
SHA25690230b0f2300f32da19b4e0cb318d3561928aeacf1dabc2f30e8224fda9ab11d
SHA51247373d6c99bfd3e7a3638b63b5105fb67704019709fdcb558fd7a4c422a7f15fc4f4ea80056c00da2544425ea1da22af7849158290783ec518a25c9f77466a40
-
Filesize
15KB
MD52024c28ecc889a46479de8d668e7e8c8
SHA1f7271c07e9b30c55a6ade702b7be1dc1b7d5c41e
SHA256ca4d30ae0e540c547026270debd839dfb802781c349b366b6ca54a1e3c1dd538
SHA5124e2877b2f0917f2d07fba115e0e1868573f1a7e48300b16a2ac3492c2c2c6577bfb16c470f1275cc8a6a7917842a9eda2d607cd6fec6d6b5a2a739ce9ab327f1
-
Filesize
171KB
MD5831ee855d302cec2761ab64c3fc82638
SHA1f948283e333812562b00f48b50a846fbda5eb947
SHA256a423bb04e194a905116b890d7e47499aba2d286571c12f6702ab943126e2fc1c
SHA5123dddc63784a977c885777e67b781686ce7983c5bd366c75a0552cef6dc9d160c65ea55ce019eaa2facf4b4bd62e393844c5380dc62f4001bdb0c1bb74221e561
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd