Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2023, 19:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://proton.me/
Resource
win10v2004-20230703-en
General
-
Target
https://proton.me/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133346129484097295" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 4256 chrome.exe 4256 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2832 2928 chrome.exe 85 PID 2928 wrote to memory of 2832 2928 chrome.exe 85 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 3680 2928 chrome.exe 88 PID 2928 wrote to memory of 2072 2928 chrome.exe 91 PID 2928 wrote to memory of 2072 2928 chrome.exe 91 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89 PID 2928 wrote to memory of 1600 2928 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://proton.me/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f5049758,0x7ff8f5049768,0x7ff8f50497782⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1848,i,14221725083757421868,14981583667723453615,131072 /prefetch:22⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1848,i,14221725083757421868,14981583667723453615,131072 /prefetch:82⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1848,i,14221725083757421868,14981583667723453615,131072 /prefetch:12⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1848,i,14221725083757421868,14981583667723453615,131072 /prefetch:82⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1848,i,14221725083757421868,14981583667723453615,131072 /prefetch:12⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 --field-trial-handle=1848,i,14221725083757421868,14981583667723453615,131072 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1848,i,14221725083757421868,14981583667723453615,131072 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 --field-trial-handle=1848,i,14221725083757421868,14981583667723453615,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816B
MD5696b23f59db41d9f792fc6139205389e
SHA1610150e2277b112b9968200b5e89367647fac878
SHA256546d35e02962b74cad36cbfbd7599d776130c4eeb28d8e49340e6dee351a57cf
SHA512baecb2742d2facf0a71e22c8e45eaececc439d42bb50273e4e921f62acf092b930940ae3f654b4594611f0c2f78f8182a71d10770f907946c4579dfd23564089
-
Filesize
1KB
MD534a01ac43b8dd1150c5252b82fc84546
SHA18d9bbe3508bba8a88d76005ae0172a036c924b4d
SHA256f335c547b5e263f83ab556144a44ac3d0cb33ba2d6fcdf888fa54de96b64a82c
SHA51238b77c94f30296222caadb1169451668d21e316bd25ed40b2506b9de5598212c3b80e4dbfd67ece0ac47f55f8540182efba3ac06e7cbebe55309555f3099e3ad
-
Filesize
1KB
MD5bf6505acb569ec6db596cc3b92ff8768
SHA11e0bf67745e7e91366120a7062682bc81b635784
SHA256476605c2b519f7700438de598a27419413a1b3596ecedb2c19822d370f2a5c71
SHA512cfb3f6451376f571cdd7868a695a0587b6b812fe763aa26332f1cf784dd4baf8dcb0228b4adbbd72a4543a9599a2bcf98cee0b63ef4b2ea585c2a3b3135ae96b
-
Filesize
703B
MD55f553481fd7ffe85d9c309e19cf0be34
SHA19636980d65f128b1913c92c80b82ccb8ba97a6c4
SHA25656abdc1ca0d28f1755c17ec21aafdf65aac005be6a1cb41311eb5b5f6b5f2993
SHA5125d71eafc09bf08a77b718356f5d8f962d77bcb1ceadec61afa47ffc9bdd7b1d7a651f31b4d4ec4b3437930b2f6c96fcfea73efc6e9b12e1f0a9dd896f08587ff
-
Filesize
703B
MD593f2e2e60d2c7f65ad0fa88ba5b24275
SHA1a5bb992e3c33f4400b64bc1df9a454950276df48
SHA256be2fc1d44a62891bba40901ba8810b5b8376fc629875975a8ff653a307556bb7
SHA512417e803a6cda10d15fe07d74b5790f438c99f6d420cece4b284df03dce93a636f1338fe4b015686a4e50f57288a1431b6a3c6283723fb1586a86ef6606fadb23
-
Filesize
703B
MD55c05789cb33d20fa972b39716418f67c
SHA11d77d888da864b63b065b5cd77e4f9e7b5962506
SHA256cd004a794100a14f54d671c50a90f3f75c6ae8c6267494efafd7e96cc8d34987
SHA512826494f9eabda2f128f7142fc63e8f0ada759870c0b1eff2a1757fe44444e99ed8e56cbdfb3256ebda44298a53c25afdbe3eee9ff0c6e663a05446bb3e8305e0
-
Filesize
6KB
MD546510cf3ec42b01db8fe5999410a9a16
SHA1366d970eef9ce033b23a00fe7d997598df746fdc
SHA2563d5baecc012710998e0d1b7f7f5197d71c2f9b63abbc026c55faeb97ca9dda59
SHA512c2ad952fcc4620283b86704a96f600c58e449774a8fccd9bd13ca535849c8d65af737000c4243c3b6d6178682add1170bde5188a73a34cdb717f48805de0ec1d
-
Filesize
6KB
MD5215b97cfe5b9000e14895ce7a4e7c89f
SHA106b5f70b52dc72dc65b9e6896e5ed70c933ebb48
SHA25673b80c909cd50829a2f01313c5753ff10f1d4dadff1c27a093b712dd51da7ac0
SHA512ffd69c4a9f3954aa112821b49ca69b77ce9c72b1cf1792e4c977f83acbcae732d5a4ecf98720fd83bef1322b03584c9dcafdcb48ab5d1d470733a89ce0a67674
-
Filesize
6KB
MD54c57588f03ab3090227e53349257216e
SHA15be34a40ede1f8b0de49c11b21c8b618ef408feb
SHA256bd7e2511e1cccadb48ae92b95aa34ddb9c19b0c741ab15f46c4521602eaa8891
SHA512249047d7ea1ee6d243d4ea9e1b3e898b7f0d15329ec444eeeccf09302c433efb0c66105765072dd8994094550f83a3ebf7dfabb17c33288e65438564385ea3e2
-
Filesize
87KB
MD594f17f92becd3cf984eff061e83a0ac8
SHA13f12288cdb0730cb3f13082024d236b5be3cd3ed
SHA25629ff5a682459ccf86950210d5bb5f4f5ce5d891a2b6bffefeefa55926889c028
SHA51250fc04071999b321d9d61f2060a75cc7fb381096735990a88cda773c60293b2a2d5772852a566780f5cc7e26c8ef82ed41386456135dcb2f6d3e9943531d5da0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd