Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 22:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pnrtscr.com/4ci90a
Resource
win10v2004-20230703-en
Behavioral task
behavioral2
Sample
https://pnrtscr.com/4ci90a
Resource
macos-20220504-en
General
-
Target
https://pnrtscr.com/4ci90a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133342806166841792" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1084 chrome.exe 1084 chrome.exe 1564 chrome.exe 1564 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1084 chrome.exe 1084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: 33 2468 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2468 AUDIODG.EXE Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe Token: SeShutdownPrivilege 1084 chrome.exe Token: SeCreatePagefilePrivilege 1084 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 3368 1084 chrome.exe 81 PID 1084 wrote to memory of 3368 1084 chrome.exe 81 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 2892 1084 chrome.exe 87 PID 1084 wrote to memory of 3956 1084 chrome.exe 88 PID 1084 wrote to memory of 3956 1084 chrome.exe 88 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89 PID 1084 wrote to memory of 2908 1084 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pnrtscr.com/4ci90a1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94ea49758,0x7ff94ea49768,0x7ff94ea497782⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1880,i,2957831168637009591,6283613970430386097,131072 /prefetch:22⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1880,i,2957831168637009591,6283613970430386097,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1236 --field-trial-handle=1880,i,2957831168637009591,6283613970430386097,131072 /prefetch:82⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1880,i,2957831168637009591,6283613970430386097,131072 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1880,i,2957831168637009591,6283613970430386097,131072 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4940 --field-trial-handle=1880,i,2957831168637009591,6283613970430386097,131072 /prefetch:82⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1880,i,2957831168637009591,6283613970430386097,131072 /prefetch:82⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1880,i,2957831168637009591,6283613970430386097,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3764 --field-trial-handle=1880,i,2957831168637009591,6283613970430386097,131072 /prefetch:82⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 --field-trial-handle=1880,i,2957831168637009591,6283613970430386097,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4320
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x518 0x3fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD536b23a8ad8c3ec43902a09d76c9fece0
SHA129639f212836fa605d543b4e09289984c116e3ef
SHA256df51ff4a20cd39a71aaf429d6ada17b0e109b029bed0bdf2e33681a5f7ec0fde
SHA512d48b24d7b009ac216e371b8a50c322e2177dced92109745a488b97ef3e7f1faa08016bd9e9def08ecac43130dda825dc79998f3a42542648c0eaae9ae112dca5
-
Filesize
706B
MD56a25679fe5e6a8bbfdc68e89a4ec619c
SHA134a13c187dcae63e97bd7f7210de37c11040f8b2
SHA2569e3f7b60e5d6e1f628276ad87109e8131c2f6f3676761c43c3232077f4958e81
SHA512a4c10202e01f26904efd8db0611c1d207281936a9719672051714927b57afbf0e062235990176df45515eefbae6193629f5326f53073c2cce076dcc180a9d551
-
Filesize
6KB
MD535c19ee3162983065e253d77af81c8d4
SHA1a97a4ee95b4631999b5e20c9a763f6d3665ace29
SHA2563ebe7ffd05c45ef210d84dbe19e0aaa843bb5fe2a8bb224db29ced2cf8608f8c
SHA5122e87002940d814d87b74cfc3d852c701c52f4a7dab898e016e8ff95aa4fb818f1f51d8aa5e8c97f9bace8066b584eb2b3363f2d55be9a2eeca0b1212cbe9583e
-
Filesize
6KB
MD55bd124da0c40bee49a2549111c3d8b1e
SHA153808e0c20cf3629501a146261d29327e9592aee
SHA2565f406eeb7a57bedcd2d5cab258b8f0febac309803eb6117b5edc6f243504cb9e
SHA512efb7d6c10a47076c49ae158045eeb80007ec9d7f10fffbdb14bc3db2d4292ad83f8144f59acf06d311087650044768cf77e1e8551bf23320b1777a9bbe5438e2
-
Filesize
6KB
MD573c1e724a22e3b764c039dfe7ad4eee7
SHA14f155b95a6660ee63942d54b2045686ac5413712
SHA256a111114e2e6aaf0f015ad2e99a194e46b9c9e24b577b124bea33b16a80266701
SHA512713c9850c5f19d3f147df98f9773e4dd8b7a7943d5ecf3fc7b8d22bcb1c20ca35530b7eae61be601d20e680eb52535524f49291475728d4c95be578e3f8dcdf0
-
Filesize
87KB
MD5cbab42113fec5655884ea3686234d13b
SHA16933d55f77e38da0b40a640256aedad3af23bef2
SHA25631755c00ab7c8d283f2eb1a7ea66356cd44667f884fdc84758e8e1c82db5682b
SHA512e6eb454ea9972ab278c018756d34f8f5c310a915611d2551429e318ad4688e2a15e43ab55c5d80d1fcf2bbd3bd4f6e7c04a963bba331a9f4d88a1e04e438c183
-
Filesize
102KB
MD53c7fefc9867afbea8dcbe547f9b1877f
SHA1cff532f7f7d109557314a5211da08a6f7c2ca118
SHA2568f836c9333df9a12561b344a61606d044e7fcf28ecea12644849d71ecf66eb53
SHA5129bdc4376a0afbb89b10d5b5185706ec1f9c1bbdd0d01b28d0cc37b017895a9171a457f0918e33371cf0b13336128d013ac07a0891968655b6723101188af0e03
-
Filesize
101KB
MD5cde699b1de383721417aa3d3a9b6c796
SHA1f520103850f88aa2d3787a6d27ce95ba1f17436b
SHA25691aa9d5f747e3b34e8fdf80cc56635e6e1e586a884eddde0692ab89e99e6a605
SHA51242645b3bed2eba26fabe1104c4863ff8634b0cdfbb176bd086e757a48711c3254b7d4753cfed19d38ce6d551e2189092921c4d5f09bbcb519e1d9ab777319291
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd