Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 15:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.vbforums.com/showthread.php?900231-vb6-edge-webview-demo-by-IUnknown%26%2365292%3Bwithout-rc6-dll
Resource
win10v2004-20230831-en
General
-
Target
https://www.vbforums.com/showthread.php?900231-vb6-edge-webview-demo-by-IUnknown%26%2365292%3Bwithout-rc6-dll
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{6DCFA791-A4BB-440A-92F6-B3DE44844E54}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133383142741113991" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 3636 4704 chrome.exe 40 PID 4704 wrote to memory of 3636 4704 chrome.exe 40 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 3672 4704 chrome.exe 90 PID 4704 wrote to memory of 4160 4704 chrome.exe 91 PID 4704 wrote to memory of 4160 4704 chrome.exe 91 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 PID 4704 wrote to memory of 4400 4704 chrome.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.vbforums.com/showthread.php?900231-vb6-edge-webview-demo-by-IUnknown%26%2365292%3Bwithout-rc6-dll1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1a5f9758,0x7ffa1a5f9768,0x7ffa1a5f97782⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:22⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:82⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:12⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2800 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:12⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4644 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5044 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5252 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:82⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 --field-trial-handle=1804,i,5954699627422348785,1914184730555672701,131072 /prefetch:82⤵PID:2172
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3064
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD598128ef9a2474d1942933fe285cacbe1
SHA19fc187bcdd9db963d7d495ea85ab74f674e4fd75
SHA25645c551aaef83a43759d735c7bd5dd20cb7371ee7b3f3ce87e9f823a93217546f
SHA512b3994ec821bcbd91773d6c6b3450b5a4ef6d90dce41674839ae1f3654a36abbd551b5b1a21e89753fd37572759b5b6afca6d411442da972e06d3e3f625bae553
-
Filesize
874B
MD5285e70eb7d10bf4c4a16ec6d0272fe80
SHA13517d3a3762fda1852ed2bc0fe3cf53efe165f8b
SHA2563751251294f88ae21ebc5823f7ab80db0e6328c9ed680308a489e779da4bdd52
SHA512d08bf092b532d3b42358beffbe9d3a20eb476b9495f0cf05c7de2702d4b9ddcd020a6482b93c43a6aa274f99139d7ea15f2b36edb2658e90f0fdcf0794bd796e
-
Filesize
6KB
MD59c32058a27eabbb560791b8dfa58db47
SHA19d5a2f68d43cb9f8fa7296e8c0302031424903c7
SHA2569dfcff180a45ff457168c058f56ae15a76e36ad410aa57a3cf63e65e8c6d484d
SHA512e931daeda3d32f929f24f33596b025edeba5a206a20c26ed6b6bd401f47ff276416f183ec9ac5b250f524608ed7ba07d0aabb2161451ecf68ceb4cc8704a91ec
-
Filesize
6KB
MD510f85707870759700cb76472f55f5a91
SHA109833b7f8fb8753b46ebd034f0a53c43c5d74f86
SHA256324f12769c5d4e06db3944bef2e16791561f48094af1b37b2d526d06d8665a4a
SHA512ade6aa95a8f124da54e59e6509429faa4632c6b95644d3c9d7afa7fd1fb3615f4e882a3bfd00a37cb5ecd851a090371b68ee54b54d34e7f82500dac58dee0f25
-
Filesize
100KB
MD5ab5a3c57bdde77a05bf661a5d81b8cfa
SHA137cc15a08ff0d930434e22968d56af71f7cf91d6
SHA256c6f2d03d282f0189f88716f29e2de767f92b3fdd44a35a1189f6f890d1b3701d
SHA51266bcebb01a53a2fd6a5e645e48503c5f79f713997ae8ef3ba376504ea18127d1ebd88822fdd838e5e3bd142899735a299849ff8e3b61b7b6605fab1d6a79cf0f
-
Filesize
99KB
MD5397d0c879c9e16aa5ceefb10c5f3af48
SHA10999427b9c74f8bf1c522d7bbd18b08f0493cbc0
SHA25617cabaffd908c7a2a1b7cc7f32534693dd416f8d4af218c4ff048283c9cad745
SHA5120dd3cd5bed1bab0de37d01ee1270bd233d89a65d47b9cbf00f6d59179b21ac0c732c38a9b8ab5c6a489064ff1a47479e39e0d7d6fdddad7f5629eb6fc6c4345a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd