Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 02:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://submissionato.info
Resource
win10v2004-20230831-en
General
-
Target
http://submissionato.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133382678556855119" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 4256 1612 chrome.exe 79 PID 1612 wrote to memory of 4256 1612 chrome.exe 79 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4880 1612 chrome.exe 89 PID 1612 wrote to memory of 4696 1612 chrome.exe 90 PID 1612 wrote to memory of 4696 1612 chrome.exe 90 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91 PID 1612 wrote to memory of 4244 1612 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://submissionato.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7fff0a929758,0x7fff0a929768,0x7fff0a9297782⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1868,i,11410714735377659459,13732780381993526689,131072 /prefetch:22⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1868,i,11410714735377659459,13732780381993526689,131072 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1868,i,11410714735377659459,13732780381993526689,131072 /prefetch:82⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1868,i,11410714735377659459,13732780381993526689,131072 /prefetch:12⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1868,i,11410714735377659459,13732780381993526689,131072 /prefetch:12⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1868,i,11410714735377659459,13732780381993526689,131072 /prefetch:82⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1868,i,11410714735377659459,13732780381993526689,131072 /prefetch:82⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2852 --field-trial-handle=1868,i,11410714735377659459,13732780381993526689,131072 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD52dbcd9eca9bed4fbc5925523a3e90988
SHA1ba1c0471fb2bea4b6073c82c8d6020bc76133f87
SHA256e301d3cdebc55af2b856b42741dc7eeb7c3abe4721a86f82f510e8639c675885
SHA512a16321b0bce86672c53e815afee6032653c4cb49c2e148b9aa27edc15d4ae5cfb7363a87a69bb1a454530ef94abfc2e7bae4ec78a001e8f5ee371f9c08660c05
-
Filesize
190KB
MD502912813c1ecf353008c489beee55888
SHA1b3ad4278db9fa8b2bbd6b90b9b5872c7f120c484
SHA256c553173b654ea9b12584edb9dd74487902849ad40cd79f20592b6542f9e9bd5e
SHA51238c7634c278d76f3d83f72d40e8e7f76434be6b93981ebf0f6bf8630ff13e8e78b9b600c690bdc8296450ec76ca38cb96b659f594a1cb720b04bfc4a3f61a930
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd