Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 13:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://events.elastic.co/2023-08-15genaiworkshop-amer
Resource
win10v2004-20230703-en
General
-
Target
http://events.elastic.co/2023-08-15genaiworkshop-amer
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133354562438439801" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 2920 chrome.exe 2920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 4172 4732 chrome.exe 84 PID 4732 wrote to memory of 4172 4732 chrome.exe 84 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 1520 4732 chrome.exe 86 PID 4732 wrote to memory of 4324 4732 chrome.exe 87 PID 4732 wrote to memory of 4324 4732 chrome.exe 87 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88 PID 4732 wrote to memory of 3780 4732 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://events.elastic.co/2023-08-15genaiworkshop-amer1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936a59758,0x7ff936a59768,0x7ff936a597782⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:22⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:82⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:12⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4488 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4916 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5444 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:12⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5700 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:12⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3380 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:82⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:82⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5316 --field-trial-handle=1876,i,14935561543614270225,4414726355378582568,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1052
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5180c03c6e9df7267c7b679d642c06e1d
SHA1c0177abd79cfd538ba6634a426d2af68ad90d4d4
SHA25609ed66dc70a163ddfc5e02862b7fdc422b072987ef234422c0558ff60872a176
SHA5127731a4224736a370fcb4bc92f60fd91596a5f56e52209db01540f9318c4dd25e2fcb828a298f57ce35ae2b3052d3f8c5f24a7648f46ebe069577d86d9c5715d7
-
Filesize
3KB
MD53d0ffc65fec2e126534840a7b4cfe15f
SHA1cc63ef1c53ee86c6ebd61a820da5c92ca542418a
SHA256c081ace8c7b6f6516b10da6a194a1809dfc799eb382abac11c5a04e6da10f594
SHA512ffb01d7204340c07f915db0cb6646960b06549704b89ce6de499e97e14a6000cc116f3ef281ea719dd5a223e99117f75f1113b0dbe0d72b36d6cc5a001008e69
-
Filesize
1KB
MD50a9c5f23238d5dce5283f3988c0ee4dc
SHA1feda71b9a085b65e91713b8ce04c356df08a8836
SHA25674bf02b08ac072daa740709aef825e3d8af0ae31b4dd72740dd4cba4db678164
SHA512daa2b3a8135690e8a4180debdea55e044e80c4e09b86d32002c13446903e9485053daa7d1e697aa5572df127675f1009e9f9ec4e1167fa0f76fb6d894020bec7
-
Filesize
2KB
MD587a2b6d42ae5c5003f76477a63fd31a9
SHA1fab6775f5a4b8edc6185a1c457525883153408cf
SHA256fafdacbeba5205d8ee257edf0b86202e0d1a9aeb8c9700881ab6e5362b0b510c
SHA512d1f15e3d5970c33925332e7a8b1bb7203d9f78b89931222943787280c5e31cb9b8b75967fc71a2be7130d695a6df2fada1f8a495732b20ff8a2750db537e6b2c
-
Filesize
5KB
MD5b492ed7761b42acf17673daf5b347cf5
SHA11414b4110b706c76b8f0c4323bcd5df9af5cd0b4
SHA25615bd3a8693e1f1ca62bbaf8d17dbdf9c3a502302266a75e8765d219ebd80d256
SHA51279ece3af0b6b7b0c043e16762e12ca16b9cda850466cd14957071e9e27c0dc6447a07457022587f625cbb21201d7b5d19dc3514ac8e092446d28bcca952539bf
-
Filesize
5KB
MD5403f4dff432cbce7bc530b7ffa51d862
SHA1f7373dcbe51266003e2c9bc267b38447c2583919
SHA256a2f1644516f0b8fa9acb97003d40cbb80571cec403ba368c5c620f89f2601c12
SHA5122e0cf285aaeb4cbff1adcba08d7a175e9a5dd580aa0a93e28aa33bb9505035b3153f357a326532dbd220d9db303ed2a35de78d127422eea3bb5d8b1c24aed5f3
-
Filesize
5KB
MD58a7b7ae5f8291e3592d23e7e3e6885f1
SHA13a291e2b0f5f4ede2e0c85cf8d8782de56ac659c
SHA256251c9c965501ccabc18ca90d68282cc0ed1c76dfe90276628e9a1a3a04cdcc6f
SHA51254150343e66eb105e38e4a643f65e7702270ff5d71820f637339626d2b38115963b6e23847187ad7d554c9e5ec7e067fb936914306a283bce06a00ec574348cc
-
Filesize
6KB
MD5e2e5587c516450c1150069b87af05025
SHA15c2a53bcf7570afeb080519ced502ef2d8a23b9f
SHA2562a25ec31c745db0caf50fe3b3d7ef51f376beb787ec4b68a58ca3f6ef6a8788c
SHA5125c93bf1447800ccba43a80a068b5251d9ea7df46891aae3c3546fe0951b95fd829b8db06da674682ae370c118777b038f79e032a76d409241390349be8eff3e1
-
Filesize
87KB
MD53a9c0b19b3123da4c96e8a835c8d4a51
SHA105262b47beff8ec0e045ab78f408f47751d9a056
SHA256d22abb8278c67c4eca0d923aef38812391efe5f6c63083545945ed332f8dea8c
SHA512d4fa7a63c8c5a28408ddd092e564bce52af41dfba0c851459f3c47b74017225390e9b7cc7826d593e1fc9e18a09133d94adc11697337dcf538ecccb4d6eb278e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd