Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 20:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1uYJFVC3HF1a6jY54Kibj2Vaj-DP54Q-v/view?usp=sharing
Resource
win10v2004-20230703-en
General
-
Target
https://drive.google.com/file/d/1uYJFVC3HF1a6jY54Kibj2Vaj-DP54Q-v/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133366065718407347" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1684 chrome.exe 1684 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4960 1528 chrome.exe 80 PID 1528 wrote to memory of 4960 1528 chrome.exe 80 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 5076 1528 chrome.exe 83 PID 1528 wrote to memory of 1688 1528 chrome.exe 82 PID 1528 wrote to memory of 1688 1528 chrome.exe 82 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84 PID 1528 wrote to memory of 4700 1528 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1uYJFVC3HF1a6jY54Kibj2Vaj-DP54Q-v/view?usp=sharing1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff03de9758,0x7fff03de9768,0x7fff03de97782⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1872,i,11694200989198434982,8445561741927767885,131072 /prefetch:82⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1872,i,11694200989198434982,8445561741927767885,131072 /prefetch:22⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1872,i,11694200989198434982,8445561741927767885,131072 /prefetch:82⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1872,i,11694200989198434982,8445561741927767885,131072 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1872,i,11694200989198434982,8445561741927767885,131072 /prefetch:12⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4584 --field-trial-handle=1872,i,11694200989198434982,8445561741927767885,131072 /prefetch:12⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 --field-trial-handle=1872,i,11694200989198434982,8445561741927767885,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1872,i,11694200989198434982,8445561741927767885,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 --field-trial-handle=1872,i,11694200989198434982,8445561741927767885,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD596993db0d6b9f23d6c1fcc33f12b12bb
SHA1eba63d976bfa7ace04ed4bc28b415ac93652aa2f
SHA2566a86981b4e2998ef8ae116b864fe7e872b887120a48a66fc323648dba3bf8636
SHA5121376773ff3299e891e952660167ad184b64451dfba1a8303f5564ae7af5fd2565d0b72c1a154965d8fd4b52327300b64ae9d5396cea9d59b334705432725ef9c
-
Filesize
3KB
MD5ab96b5374942f679d2ab0ea911746460
SHA1ebe6b1fc39565957b1242e4a411f252251bb3e7b
SHA256bafcf7d32e3d11062f5237475806ba2b0c5dfab531b41a10bc31d3202d4306dc
SHA5125b3607f2383c27a5b31e106a6f06352308402bbef5563d795c1cc33c99021adf880cf5da53e7a370a3d6ebc308491eb715abe29f178c71b03527072fbba24d56
-
Filesize
1KB
MD5642df9cdc884cb6a8429139504570688
SHA196e6d37c57377a820a412a9f5259eec712405bfd
SHA2568b5af867538125db629539060af97e53c235bb603acf578be5f68172ea7875b1
SHA51212302eb86c66282f85b70166ca6b254ab81044f3802504c0e8bc9e3aec14f96ff43f3d536149f64f7fcdf45fd367da36154aa6e151bbcb7cc768c613175f600c
-
Filesize
6KB
MD5ae81f1eddbaf66848961ed7ee14b60fa
SHA197e1bf1717244fced0cfdf2a53b57e204325f140
SHA2564fa2eccbc1c746f41d9a34557115c96ff8d895f4e07749c6aa1cca72f72c89af
SHA512102c4c1dc7c5376290b3fad83999b7d3cc0501b0d384454ee2af0622df156cd3c6c95fa4f47f95ae9007cd867ecd98af425052529f5690d8525221a35f69d4ff
-
Filesize
6KB
MD5c6110c0fca58679dc9d4b023d6bb9f0b
SHA14aba2e87c7a8a23f15bbffb3dc4e12e5a23c3515
SHA2567050cd854896b6530568792f7418aab8be912592a5bf8cf0a294e66655416f62
SHA5123094ebf05767fb4dabbf9ac7e672afa87db704cbcb694739894ae2298f98b67b03b6abf705b089eaa985945d7f107f2b8a0819e77fc43360d33a8b1ca6b77b6c
-
Filesize
6KB
MD53ca436bc7482859b2b8f4143b4b67dd9
SHA1397bf78bfacdb0fe26e070078a3196142e257538
SHA256bfed0b1fd19be67cef7bc460ee36a260c4644163b7970acfdea01e8c168256c2
SHA51254965a369dd9ce2752b93d14e2608fd70393ba6ff77013cc8bdcf67953408f944cad52e4a9032eac107ee6c2e33ee1259b31c00477b870ef6b68d2843bf3a4ac
-
Filesize
87KB
MD5f3830d80d2cc9482f336c3fad8f0aac0
SHA122a32006fb4aefc0d38ff2d9ea09ddbcb7b163a6
SHA2560694dbbfa1f05d3855b39fba12a58dc23075f1e442b2318cd0e9f4aace7f01f9
SHA51234a0faae6cabc6e5fa066984c8fe8883e5c58581acb25a4aa5824059cdb5cd39f1dbd6b937d7ed4c351bbe828945812fb1e56d884edd25fcba72015bb74170a9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd