Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2023, 20:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://js.langchain.com/docs/modules/indexes/text_splitters/examples/recursive_character
Resource
win10v2004-20230703-en
General
-
Target
https://js.langchain.com/docs/modules/indexes/text_splitters/examples/recursive_character
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133338395628241464" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 944 chrome.exe 944 chrome.exe 828 chrome.exe 828 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 944 wrote to memory of 4048 944 chrome.exe 63 PID 944 wrote to memory of 4048 944 chrome.exe 63 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1276 944 chrome.exe 90 PID 944 wrote to memory of 1416 944 chrome.exe 92 PID 944 wrote to memory of 1416 944 chrome.exe 92 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91 PID 944 wrote to memory of 628 944 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://js.langchain.com/docs/modules/indexes/text_splitters/examples/recursive_character1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3ef09758,0x7ffb3ef09768,0x7ffb3ef097782⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1892,i,7636995709152963119,10750372877222144322,131072 /prefetch:22⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1892,i,7636995709152963119,10750372877222144322,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1892,i,7636995709152963119,10750372877222144322,131072 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1892,i,7636995709152963119,10750372877222144322,131072 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1892,i,7636995709152963119,10750372877222144322,131072 /prefetch:12⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1892,i,7636995709152963119,10750372877222144322,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1892,i,7636995709152963119,10750372877222144322,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=1836 --field-trial-handle=1892,i,7636995709152963119,10750372877222144322,131072 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5488 --field-trial-handle=1892,i,7636995709152963119,10750372877222144322,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5b97b7b94ac86e44c2a75511265898b6a
SHA158bf388d5ab8de093e8d8eadc2f9804dc59ffcaa
SHA256cff371a1e6b570457e77e8552233c8d10fa695b54aa217382bdb87adac6e929f
SHA51271e30a214cac77f4721e36cba540c0442212ed0bb456a00a0ee315f3ce7af26266d9e7b81b282f47642d43e24ddfd7b35d52c5407400bc3ef6d9ed8146b02812
-
Filesize
288B
MD54b29a942acbfd53aff717dd62306c07f
SHA125a623b76f114802c8add294021add4639c3bb4f
SHA256bd45b6106ee92a3a0215c5a176217a39a1e6329eaaca33f7a514aa786cadc169
SHA512565a794da8cc11123b880d6ba6e4b778d33044db354fe015bf6e46a83c3a470c58985171fc66e8045c005b54774270baebc2f34e7e37251ac75989e05a6c249f
-
Filesize
1KB
MD5469eb96c4da1de4e7c6801c42019d82c
SHA18b519578fc38b9ed9e9597778b9bd03e145fedbe
SHA256c0c2ea46869d7be8b11c63b3aad7d9e1c7ad402dc079dbd53b1292a988ebe2c5
SHA5120f3ddcff60e724ac9043031406f2cda28241608dee733b596c3296ca409c44684d510c454550efc71a4fe26abdaf512fb2e265779c5d3d1e813eefc4cc9e2511
-
Filesize
2KB
MD5cbf299acfeaf3b1cc3944c76e7d35e9a
SHA1632c459b22dcfb9be3d1bc674dabccaf451870e2
SHA25640155c1c3175b25a550035848ff6b682079c0ff1ef00d4b374ae8137ddfe0596
SHA5124e154b086d90a2f41eb8c03e43a3e1c03029b2f0b4df48b4e05c6ade28236736a7efcaab1fdc585e76940af8e2167c1957578d2d2b8e55213e3798f764b8a295
-
Filesize
2KB
MD558d97b2be05b8bbaa145b173a99b5614
SHA1ecb88bd10ba3c02a8a72ce54ad0d59e76ab6ab52
SHA25635b5431ebebf901b4031c2a10c79328ef7ad12a569cde2731500e0f1572f448d
SHA512b387fbda18c0f7f756516d1eac1efaf04487839115ff97baa77337802ec21694be5f0c22c5fa196c9f34b10697d5ef6683aa38c374bd122128a759c63fc5f474
-
Filesize
539B
MD5b078803d5e5c41751ba17eb50d94f411
SHA1c1ae7be5fa38522d44be1399b937f3ba3dd34f82
SHA25657dfba6ca2e688faadb9820625180210e168c826f28e9d44f9935706439ca210
SHA512bc34309b468125673e5d594b0bd60e6cbda719fbc9452cd447b804a4d0b4bda69aadb0b13a7fc9e2fcac0b040bfc3b99ece5068f7634869840bdbbbc6b107d96
-
Filesize
1KB
MD568becb301d9a033e130df85c2a02b606
SHA13bf3d282536b8b1cf145c1578856327e8ebe53ff
SHA25629157c466836b5c0e9a6d32e7bf245e98aafc740d402a6b5e170c3a775d3e74a
SHA5126c0409fb8c4e4ef2bded8fbdc8a2692bd4a646e879e2ccfdc5c199c2b710cbb5f28e49258b432477a793ed8979cdc03515905e6470817723a6719acc8a6cde4e
-
Filesize
707B
MD52089c936ef23d4480c46350bdf8157be
SHA1f5c2b620e10b72588c355af400f5c8d87d745fc6
SHA25668aa47b2c4d4849718c450233988da2dec385faaecd99aee12859cd457b83b4a
SHA512be5ff1daad8f0c9446c7e062091dc382a3275c4b3b748537385f36cbdae8ead6cf039349f64d11f6720a168402779d3849d26b228aec95ee62602e5721212842
-
Filesize
6KB
MD5bb6559c03aa737a99fbd956f26b82731
SHA10cecf864e9f4b673b0daa95e46297d82e03ef346
SHA2560bd2c1ddad20212448092c7948836e5b4ba76970dfe9c51d03d83ced9b393c0b
SHA5128df3d375f2168bdec6172aa4f2f3ea3f8362205cd1a8802f911495bdea558cc0d0068da463f5bb9e38f03d5e3ff17a2f8eb51bf737eab1edb78b0a649cabc682
-
Filesize
6KB
MD52cc17a8301a253cf678614a1018470f1
SHA1f9c8937e1db3ce3ccbcbe793546855eae3c05749
SHA256be1b397caeb442f858676fcd0ea14cdb1ca590b7dc6463ac38bb601fa5bceed4
SHA5123b8cdc2769f29c26f82bfbc413df68cf43b54b68b64cc7f29f849e1ae917ccdc55ee92a63b5f9e6e34107486b5c084c68c46e5f8f6ed8268e5fa488ce17a03d8
-
Filesize
7KB
MD5866e615cb19e8328a0ee9a92268fcd4f
SHA1259589dea6db67617e69b0dddfcac99a4e730334
SHA2566098df6bbf262d1472a72b2bbc271351ccb0ddf93e8c4c6deaeb12aceed5544c
SHA5126b8464ccdbe6d6eeccfbe5d9108f4858dd19edbaa60058011177dfd357bb1c1e26bdfb8a782e7dfcb8adbe981f2ba89720fcde486f82d906d725d98f6df65dbe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd