Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 20:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.maersk.com/shipmentoverview/import
Resource
win10v2004-20230831-en
General
-
Target
https://www.maersk.com/shipmentoverview/import
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5028 chrome.exe 5028 chrome.exe 3332 chrome.exe 3332 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe Token: SeShutdownPrivilege 5028 chrome.exe Token: SeCreatePagefilePrivilege 5028 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4848 5028 chrome.exe 30 PID 5028 wrote to memory of 4848 5028 chrome.exe 30 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1980 5028 chrome.exe 86 PID 5028 wrote to memory of 1160 5028 chrome.exe 90 PID 5028 wrote to memory of 1160 5028 chrome.exe 90 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87 PID 5028 wrote to memory of 1920 5028 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.maersk.com/shipmentoverview/import1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1a159758,0x7ffb1a159768,0x7ffb1a1597782⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1896,i,13545272107419520898,6146810908707827767,131072 /prefetch:22⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1896,i,13545272107419520898,6146810908707827767,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1896,i,13545272107419520898,6146810908707827767,131072 /prefetch:12⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1896,i,13545272107419520898,6146810908707827767,131072 /prefetch:12⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=1896,i,13545272107419520898,6146810908707827767,131072 /prefetch:82⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3724 --field-trial-handle=1896,i,13545272107419520898,6146810908707827767,131072 /prefetch:12⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1896,i,13545272107419520898,6146810908707827767,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 --field-trial-handle=1896,i,13545272107419520898,6146810908707827767,131072 /prefetch:82⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 --field-trial-handle=1896,i,13545272107419520898,6146810908707827767,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552B
MD58475086347623ec13426caf614d51c3d
SHA1b5d04b176f280b2bcc5751500ea0076b4fa8c8eb
SHA2560e7f0e3302d572935a619370b3773fa7b2f47cfa8d29ffa2059db2fbb29aa713
SHA51241f28289f06669cc78683b543a0236af7b7ae25fc2950932595d0569329867d6001dc48a037fe365c4535b082f7d9a6f6835047df255354a6cb56ac8f440a5a0
-
Filesize
2KB
MD55401844c9d7c77e8df2f3850ce551fca
SHA1fb30bef1b0127de1c903f5f73b79692cfa7f7b31
SHA2565adc19613e83857087a2509330ce1228ed1d5a2a5302029b18cd877a310c51ea
SHA512e5673ceffd2c28be246577b441a35a1b0632de9b2ce9e95f29b41fea5cdd89d3042928ec78b78c3d0a38cbf7b8fcd77f3cdc2e874040805cc24f5adf746c0917
-
Filesize
2KB
MD53610d124d42d78e4ed641425044c24e7
SHA11faba804bc5b444e8878dc2690433e66ff449da8
SHA256fac8a20cbac08277596a99e94192f41be32a52f98b794e5b0136580cfe9b9f83
SHA512cc5e958f2f4843cbca19f3edd43c1bf0d3a0a8e1f85f7de38b8583bcd84f77dc0212502166056610fd7190b4d91a3e5bd97a63c9015862490f61057fba0f38d3
-
Filesize
1KB
MD5e9c276ad9ff9138912398a60c4701442
SHA161b9d47d863b342cb8032b94e5f0041800919b36
SHA256e569b38e1020686827593c93a0fccded2e2a6407519ada20c9cfe615ecf02de2
SHA512ea3bdc3ee2cf8994467754923234dcb692410ac432517f24a42c518c7bb39ff604a902c794d19700244120c7b212d800ff8c407f82e417910976f1f68fc0dff6
-
Filesize
1KB
MD5b743e0989f9bb0aa56f1c70669c50d41
SHA13922c5e37c997ddafb139771cf331ae0e7e4f778
SHA2560d3250b0eb70344199a1039c99e6ad7d85c1734acd5b9d239fb4ac01c458f7df
SHA512ae55830a178934105cdb8eb1d9c7a2e9021f8e6435b53598dd5872334321bd62c381be5bbb9d8553e65415e124836200a14ce8308652db682835bff6cd70dc92
-
Filesize
6KB
MD575e1f17059b78422b799d2b3084e3929
SHA1eeb05e8699846f21bb15a2f3ad3abd66243111f2
SHA25623551a2b78ded233346f19bd92164c5c0d11509842e70a97f8ad09358ac42aec
SHA5122b586c6a8f4f11013584936b0e4af13c5b715cbff25f9673eab47e58efe86305b24a0924e82d492611f692c67a4f01bf86dd2a955020692fad50f6764585c27d
-
Filesize
97KB
MD5bacc5e4afda54f8ed0e0ffe1d0a1d319
SHA1332082cd82c9aee714312e62a329856aaa1a3102
SHA256c3057c14337472854e724a91b7c3c9dbc57c60c07f99e09b8c72a2ed519f5b3a
SHA5126feb01f39f9075635f324ca251efa0d5255baef14778d159c61bfb35f48883a41b91cddc79fdb77fdec38a01743339af3fbf8b2633bf6969f2c6698f01ed52f6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd