Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2023, 07:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://business.google.com/create/new
Resource
win10v2004-20230703-en
General
-
Target
https://business.google.com/create/new
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133353485649132644" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-618519468-4027732583-1827558364-1000\{667BD565-EE21-4164-A18B-BC8FC0B1BD25} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 3220 4132 chrome.exe 60 PID 4132 wrote to memory of 3220 4132 chrome.exe 60 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4612 4132 chrome.exe 87 PID 4132 wrote to memory of 4156 4132 chrome.exe 89 PID 4132 wrote to memory of 4156 4132 chrome.exe 89 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88 PID 4132 wrote to memory of 780 4132 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://business.google.com/create/new1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ff459758,0x7ff8ff459768,0x7ff8ff4597782⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:22⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:82⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:82⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4640 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:82⤵
- Modifies registry class
PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4784 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:82⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:82⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4024 --field-trial-handle=1896,i,10127467896647015192,10409123486083477972,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2232
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
312B
MD5e8261810370bb5831eb1bbdf277180a0
SHA165540e67d7cee821bdf2cb775c96de7c920d3e16
SHA25677ed08c2f395ada3d36d8100378d42444488d031913fe4748ecebc18a160fcd4
SHA5128ddb83adb199fbcf048c5f623d32741de60c5ae41bc7c669b83c8bd3e467db67a685d649b0448ae935c48720acca28740863444c1c51218f004db005fff6b34c
-
Filesize
2KB
MD5a65e28bb904c8b3d600fdf0a71e2b894
SHA1c6863c7f0b9aabe3e7b3abab2cf26f3e4170757f
SHA256714795370c47ff8324795c676cbba4d6d284cffbbbdfa3796bdb4935ef3a93f5
SHA5129f16e73a1726e2a3882f1acbead827e5e9c1caf35326611de5e4c78648b53b041b9d7fa4390fd525a1e681a48c9a9780ebd85f2ea889f1e9b5542e9a06af16a6
-
Filesize
3KB
MD575912e84e5e21acf638ec429ebeabeae
SHA142a52b31014a8dc3411dded17902a9845d833d20
SHA25693de82c2e6cfa0ff72ceeebbd93dc78b97276b5946d87d6331ce6367db609f82
SHA512d2ef1e63f495621df0686c1fd0acfad156fc217967fb0fa2b2b8e7dca2f3e6682c44a866cde5a62940af1f9bcd56d2eb148eeff3a2372d57116a73a65674144e
-
Filesize
3KB
MD58e7095f2abe401a9940a487ca7224e68
SHA15b9ba1bd1b49156ab28edc5a2889bbe793aa9549
SHA256c99efbd676256cfda80658b1d4c38d9df9d862a5ae0537abe4defe2dc9df1064
SHA512f66fef7ef2ea998abcad9f86da2114a9af427c47ad8ed531c32317d5ac9b456a6472707297ddf9c9a20655c85753d3bf64e343ec29c199bcce4a285d012dc63b
-
Filesize
3KB
MD550ec527dce5da41951f9dc88c61ca583
SHA145042a3ecba1a210931a8be76968559d415192fd
SHA256c3e3169708ca7ce56a25e84894ec7e995f1406ce0980e164bbead1f3a72adeb7
SHA5128d845e2c48b8a24bbe029aab8dde2e3bb384f8333f890cc2c10b2e9524c85a42298d0b44fce04bdcd50faa0cb721b27b4eb4f4ed0771c640500dee07e71108ce
-
Filesize
539B
MD5268b9ed50948226a7121453c448d01ac
SHA1d0572877ffc327df831a64303508d6d98259b0ca
SHA25683045ee9ab013d583622b3b385ac9c3a53fbf46aae42c16520f1e1fe30581c07
SHA51284f3b77b18c11a0a7b76ee8a8346143de5acf1378b6929193aa406604e57dbc1d50eb366187a08375fa645dd9ef7a3c6cac46167cd3bcac26b7f49da54fa511c
-
Filesize
539B
MD5efba6e86f5ebe09bead99d422532c4f3
SHA1e70b7418de634982f715c8547fb0bccc6a72b204
SHA256661df372715953315aa2487de679f2a227e289e35c18a80e18eafbb15cefda85
SHA5124a26eb05a4f50fda7d05ccbbfa42fa6e1d597ae5805911a6bea9d008ce3ed55adf32c6545e52f976d9b1a3f44d796f5c80de4ea38bb2826acfdd3a0c12ea1ebb
-
Filesize
539B
MD5938313f3bf954c79d52eb543c5cfa85f
SHA16ba8e5f759c6fe648a791c6f24b33baa457289b8
SHA256c651710aef3d35218b27ff87fa59fb9af98ed7e677561298592155df4fe2ca5d
SHA512d8b0f1c207480bc902a8bca56d3b46923efd02dfcecfa2239ce8c98e43f6fb666ebb83491c3e3fa399eed8f07e5b56c40e75fbfd009444a1600fcaa0686057b9
-
Filesize
6KB
MD5438d3677ccb9caddee7760d4e89115e3
SHA102846e527768fcc4f6e1b2e2c35be01f89726ad0
SHA256edd40669995fed8eaccdfc492289437b89c7e06ceeef3deba4fd8f17bfefdd98
SHA5121fb9e7bfd3746f65acda7d769392f85a2f96b43caf789e6b1a3e7ea0afa1f80eacb5178469cb91afc80fd141d5f641a97f6634c39dcb45ebbf956cc135a65b20
-
Filesize
87KB
MD5767776b6e47d6ec931d59443ea5bad9e
SHA14a0227d323241cf4e89245a9cb57323e879b3a27
SHA256aade45fff89eadf5a953080fbe43a332bb3997955d3cca8554254e547e92578a
SHA512e48b175ac536194fe8a6ba4c01a50bfd7ba0875f331942e687c57ed9648bbe4ab7dc2cd16e99fc471b180cc797a1e736b6d3687cfbbae964a6c03628e9b88d21