Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
592s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 05:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qr1.be/TVN4
Resource
win10v2004-20230915-en
General
-
Target
https://qr1.be/TVN4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133395759380109535" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3576 chrome.exe 3576 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe Token: SeShutdownPrivilege 3576 chrome.exe Token: SeCreatePagefilePrivilege 3576 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe 3576 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 4080 3576 chrome.exe 83 PID 3576 wrote to memory of 4080 3576 chrome.exe 83 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 3360 3576 chrome.exe 86 PID 3576 wrote to memory of 336 3576 chrome.exe 87 PID 3576 wrote to memory of 336 3576 chrome.exe 87 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88 PID 3576 wrote to memory of 2364 3576 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://qr1.be/TVN41⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff931999758,0x7ff931999768,0x7ff9319997782⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:22⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:82⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:12⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4856 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4840 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4968 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:12⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:82⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=912 --field-trial-handle=1888,i,7718265199471321175,2439368630794280834,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5102d91bff1999d519e265ed087f31aab
SHA1e82785e7270bf4ba6efd762d729bba5fe309a3bc
SHA25645d7bc54e5e8e067e5623cccc1cd2296241cdfd54962fb96aa6e82ec39f82f17
SHA5123c43e49ded2d9da0e13c15d56ada74f540a5cda4b1751b840882ec4593e8f98bb5162bd2d2174cb1fcb17c4f074d5d3b9a3f21a52d29fd2073efe9b8aeb9543f
-
Filesize
2KB
MD588e4b90c5bb19312b119769637a8066b
SHA1a5c0fbb743154eded10f95aee8452cfa230634c1
SHA256e9d9c91b713ac69771ff0faabb44818e3f4091972b671a513281e79c5444a97f
SHA512d824dafb4c2e3b09ae6ad5e144eabb6f32ad6ca9e029808270ab2144ec4bb9c84966309cd02ad6270e04c32f7ba9cee3547467cda64bebfc47c042b4b77978ff
-
Filesize
867B
MD54af3d36c8360b7ecd1fa7244d4654c96
SHA1b1bab33d30c0567b56a00a6b1914b3955d50fb7e
SHA256d069431655de06bbf9c23b3316ad9ef4f0bd3ecbfea8040f824d63d911e80fb0
SHA512f18d6e9779eecf0bbdfed537410f75bf4a8a0b5a35447abecdb84ff3f648ca67e18ed1156cca3fa67cd022302e8ed1b543645e3ea416c552c29ade5eb1abfb35
-
Filesize
6KB
MD55ca8f8c1f6c3904acbb44bd73178bcd1
SHA1e330044b7ba287e1bbeffac36fb07b07d19d36d1
SHA256d4ab080f90d922daad467bcaab37f244cbf9eab38435b5a0afb3705223344dbd
SHA512b7af2ec9b15d5600ca81152540da9b74128d3258f8309918906709b599da48121272b2d6ee44e6ff6c79aeae2da0b532687c9ce4707afe8f968e6707e47e7e5d
-
Filesize
6KB
MD558ce36ccdba0b57859b84761fd719c44
SHA1f481a5e1a824ed485d054588a1556bdf5a309cdb
SHA2567e1e7033ff56c6ccd1757552b1bf09c827a7289270188dfbc77172c570cb14fd
SHA512a7b03b46c087eba930ef3e38920a502e3a1da004a59244eb7ef5dcaddadb34a28a84b0b57f51177056e41a7fc4fdf76ad457e42d0ba659edcd7460f2309cfbaf
-
Filesize
6KB
MD5c573be08258f4895758f7156f7fed64a
SHA1e996f928ee5c406f3732db6e0b055c16c32baac1
SHA2567c580143c1fce737eee1aa1ce48b632c22516839d8f6db5e06cc1eebf066bf63
SHA512872c3b3b0f8120928ff143ddcb023d313236ba0515b34b72c4b46eb7c65d2e2e4941dc875534d095a873f74336f3c5f85d1f1d87e793d9384c9b2992e991e8b0
-
Filesize
102KB
MD5b7313382b38d4e120d7eb8b103f5445b
SHA11425adf51450dfcb3c79b7cdceec9934652782fe
SHA256104a9d960b3ddaaead94d1f2cac7aea528c48a514930ae0587bf2a5030071111
SHA5120de92176e60b1d1c63ef1936bc8ad420fc21caa8194fdbed88ef552150a613e75c1dbd76986c806dce6bc357b61b45773b4d6483682b2d823b5b6b4178ec960d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd