Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
593s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 23:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://login.x97.net
Resource
win10v2004-20230831-en
General
-
Target
http://login.x97.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 5088 4832 chrome.exe 37 PID 4832 wrote to memory of 5088 4832 chrome.exe 37 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 3408 4832 chrome.exe 84 PID 4832 wrote to memory of 2080 4832 chrome.exe 85 PID 4832 wrote to memory of 2080 4832 chrome.exe 85 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86 PID 4832 wrote to memory of 4908 4832 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://login.x97.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ff99ed89758,0x7ff99ed89768,0x7ff99ed897782⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:22⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:12⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4852 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4964 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:12⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3376 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:82⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5192 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3268 --field-trial-handle=1936,i,16006913323330861712,8480604531345659904,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aa0fd36a324cab4217904310252f19e4
SHA12cb03c15b74ff9c8815153377f3bc970fdba29bb
SHA2565956b4699d3c5cde81a63b3b2288cdd86597124901c34ce135ab3b5fd9844cd4
SHA51229ff447af7e5c74e4bf36eb7029ea9ff3d08fcc74226a5632496212fe8ebbe0cf44f804c0ac4ca4e87354f0850375b4079473eeb542a4adfb2558dc410ac26f2
-
Filesize
2KB
MD58aec4fb13d17865845ee96e4b871fe9d
SHA13aad9b2d9b5e1b121b80c817e45e912202d97e7e
SHA256597e28e3eec230205e51fc2b6069ecfaabd82409002aae58d4f6991623a7ab44
SHA5128ecc58da8cb0cde49e2e5fdada17fa697f887813fda81b4b2e1fa114419fc600dcf4da0287d8cbf30726450aaae984a3795ecbd457d15a083adc06beb31a434a
-
Filesize
2KB
MD5e9695925270eba783923391a97829f7f
SHA162b55df4c8d750ccd6d6fb6095441c14927192ae
SHA2567b8a019c14d446e9737de1df736d4275b955f60be2f0c17dac0f30bb8051bf22
SHA5126d743829a491c71c57b8a740792c07a7c3342e510ee988551ac2134130ee0ea907297332f7f04f44298213bba15b7977fb7fffd9868bc5e263861ddbd941824a
-
Filesize
2KB
MD532268578856bef8332315cd835d1f75f
SHA18cd057e8f05be9754c24f8064795ea8093e06155
SHA256d4d940e53724d2858a42dad3f0b18474b9964d3237176b4e6d2dfcead8ef922d
SHA512f74fac555a220ba4711dac04c7d2ceb6874b563e035a9b672fa2aaf650f072b9d71d08ad646a347a6a53c3c631ebdf66f9c5d2b7c13a013a44c13716d3565311
-
Filesize
6KB
MD53ea3f7b5da0f86a9c6e8e0530f40b381
SHA1feb4462ed45237d64dbfd2bff9a50f8f5c9e0c5c
SHA256acf45542038b0ed5d6e08cfd349a4d81d03fec9910284d0a277a3b14df1f160f
SHA51224947279b23e84a258d9433ab6ee7439002e26bc4dc08d08c3f12a5c0faff4179447cf1f1fddcba2e7671ba9d8d8c72f926c51a649c858aeed6d89ebcdf2b6c2
-
Filesize
6KB
MD57c1de01303d978dcb96bd7a3759a2239
SHA19b2b8126dbce37bb194fff864da3fea6d08eeff8
SHA2566f242a0126872ed9ccb0005408ae619868422036a30f210d65905b80af553847
SHA512fd4cdab9449057553d4476aa4e6b52af7fc7f5dba8e0f545e44ae5c67b66f4ce4513bf3234f16d63bf6500ea51c5fb362e262710fa8aa6e83041ea264bed2a55
-
Filesize
97KB
MD5aa233c937ea76a6e29b55d994cca8628
SHA1bc75d8d6fa9d2c867b54690307a253895b046cfb
SHA2562a9d8ce9155e0dd0b6f1e8c54f2cc5e13d2d54f938d9fbb6f973336e3807c956
SHA512b1654254ef9f303055c0ddaa69c9e9b4b02ea679295bd6ab7e460bcc2335b78dc97d9e868f22252e3916c67b2ce245faf328ebc396bee2289f67294b7aaab6f1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd