Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2023, 13:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ihcm.adp.com/
Resource
win10v2004-20230703-en
General
-
Target
https://ihcm.adp.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133338165667116735" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1498570331-2313266200-788959944-1000\{9A01F83C-72D2-42B5-995E-30604486B480} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1536 chrome.exe 1536 chrome.exe 1348 chrome.exe 1348 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1536 chrome.exe 1536 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1536 wrote to memory of 484 1536 chrome.exe 86 PID 1536 wrote to memory of 484 1536 chrome.exe 86 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1124 1536 chrome.exe 89 PID 1536 wrote to memory of 1872 1536 chrome.exe 91 PID 1536 wrote to memory of 1872 1536 chrome.exe 91 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90 PID 1536 wrote to memory of 372 1536 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ihcm.adp.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff904269758,0x7ff904269768,0x7ff9042697782⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:22⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:82⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:12⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:12⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:82⤵
- Modifies registry class
PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4784 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:82⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5708 --field-trial-handle=1880,i,15776022947497268231,3806458310266343775,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD552e92961d7c521d44b38ebab4592d0a9
SHA197b5ccf8cac8acee861b8a83ba64fa0d75bd2cb2
SHA256811814009309bf60da27343038c1fbe6a5b211930377d56e15bc8ba4b4f17f61
SHA5121d3db0f3dab6027055537be2cd7d524700aa3916a76ebfb0be9c0c2e7857627cab151a093da787e634969d906d750e7e2a7af3432ef03063bed771d4877eb2bc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\66931dda-1d23-4e04-ac24-7ad67ecfa292.tmp
Filesize6KB
MD50c27201226f91a4ca038362f8b4f68ff
SHA1e9c93cdbd24d6f4931d11c769056ec296fb29834
SHA256651a35bafbf9dca399161d75b9d915916c72a677fc81f6f5712dba55ed7cc45f
SHA512a9a509f264df3ad76e786d9c45e6841b20fbc176e8342a51f5241f1838db7e7f8216200c01066d3bd568242ceed43fa1e94b01cec898cb5afbe2a0cc8c3037c6
-
Filesize
216B
MD5b51a98a6f80e57cd27d77af0513916d4
SHA10a70bfe5ca0507e371abe0208c3f878731fdbcd7
SHA256ec183d69b5311f4f7fb46fdee918a8a25ef5a4772c1a0e3686a5cfdd0060916a
SHA512facd0d0a2f061f2754d84ccd12246fe09907f0f711ce0ccc5bd2fc693f3a04831f61e9ea21a82afa9b62e53199447efa70935fedfd7841be390cc882d243889f
-
Filesize
1KB
MD59a4267c27b13e71b4655c77babab896c
SHA1ca96b9e445c16bd7420383f26b7777585d25e26b
SHA256fbe51c2575b2b70d07fce687ea05c6e0fb8ce78f385dcd86b7120b2a529f46cc
SHA512c121201cb5af7c73f0edce4d30c623db241275fdffd1242b6eda520178edb8f374c399e83d69c1097cd981fce3ad5f02dd86adb9a5aa0530c63c2910b0a32e57
-
Filesize
705B
MD593c6c440082f4d95abf8307a815ed023
SHA1898b626b72937908ee731689c316346e31ed04d5
SHA256462b268c12b9e910b0df232bf6db313f31b536234431409faf79c7afd346b0fa
SHA5128eda93b2fdc1d5f92ee3c01636d99861cd7b3566795ae6dc94e5c8a7c65371874d2ed8dde45aef38d34e1e97f371ce14aee3d3324029462923f2159c454e43d7
-
Filesize
5KB
MD58b3b7b42d895ee57ea7e8007d973a092
SHA18c3daefeedb1804b966ad2f4e7b004f840ab419e
SHA256cfa6258d4654a3ab8f42349ed5eeee19bbe258dc8385b44a6237d94d87b06f29
SHA5120f4bb5a519e6205f3acc3363ac6e9c069c50748ab3e44ef7a52e5b115257896783a1122c0f96951cb5fb5fcdb6573f64fe09bed333dea624d54021230600c1a8
-
Filesize
5KB
MD531c480009b5ab723d3f935597cdaecce
SHA1283340873e36b480feaef1d4d339d0591c4b1171
SHA25609fd6345cac8105f384df9a8200cf192f86eadbacf063d2b1ee2caf0221a3558
SHA512c72c459c1f71e26eee91b35477271be4e78dffcfa7f913c82b6d4a0e778066a6ad9863180925e6f1b36be68a82069d539419049ac08790d7fee9c5642dddb6ea
-
Filesize
101KB
MD5aa229397fdd23847cbc51c06085f6bef
SHA151953ac030d64167e6fd1a43cd7bdadfa6f92384
SHA2563219be38743abc88b5bbf94d3b6ae221cec35b7e550fcd5f36776924b50b5ab0
SHA51247406072b03a6c88097a4f45874841d8f1ba8918a30e1860a7ea7f4fe5af394259857a7658b9ed1753a471bffe8739c09527f339c448bdba5b0e0deffd4dc777
-
Filesize
99KB
MD59b851311a84cd0d47fd49390eccf5f1e
SHA19498ed84b22dbf4b9a6e70566c0888566d8fec2f
SHA256edbfd055e49b8ad9791cbbf47459daba269c0dcee29a206e7b4756fa4936cc01
SHA51295e894942b6c1a465712261643f5897213782f1c7bc6beeea61c34d6474a58d7387a90f4d275c25101af2687ed92c4f81ded42a0652f813d23158fe7da79b7d0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd