Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
02/10/2023, 13:03
231002-qad68sce85 102/10/2023, 12:59
231002-p8k7rsce74 102/10/2023, 12:52
231002-p4a61aah61 1Analysis
-
max time kernel
209s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 13:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://[email protected]@[email protected]
Resource
win10v2004-20230915-en
General
-
Target
https://[email protected]@[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133407254129855498" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4088 chrome.exe 4088 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4732 4844 chrome.exe 27 PID 4844 wrote to memory of 4732 4844 chrome.exe 27 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 4780 4844 chrome.exe 89 PID 4844 wrote to memory of 2236 4844 chrome.exe 90 PID 4844 wrote to memory of 2236 4844 chrome.exe 90 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91 PID 4844 wrote to memory of 4100 4844 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://[email protected]@[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa7be19758,0x7ffa7be19768,0x7ffa7be197782⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:22⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:82⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:12⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:12⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4484 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:12⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4960 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:12⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5040 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:12⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:82⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5076 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1880,i,16243189008330291398,4321912512030694423,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD57a51f636ad05afab4db771b94d70a0cc
SHA1f593db3b9b6af917bc1aeacc5f3c76b865be1b8f
SHA25695918818014fbe8ac5f90b5091e4a117433950f0cced39f5b40c17e80c869e71
SHA51255527545e0d87c30bbdb4dd2ab7de2e19b1d2b01078a47a45126fcb49365bed3c25c8faf0a1b2bb1fb321278173680d066e48c336973809545a76dd20e5d56b7
-
Filesize
192B
MD583c0087bb2c6a9364480e3c47fbc3e94
SHA125080cf10470572469606a9a26a5d54bee3ffd92
SHA256b9096caacf9b90025529f22ff887377e1325d1c88d9a0fe3c42be7459738cd21
SHA512e2995c9a232a0597956611bca6f6e2ee1f3c7666924453c01516128d596bbe827f78104ae432225c6bffdd3a310acbdacc0bd5dbbe80e90437669ac70ab4de69
-
Filesize
2KB
MD5ad781001b7cce6784fe57e09b4665512
SHA1fd906eee0d68b30de8cb344d97c01b0242f816f0
SHA256214f370c26e38c6614b39ba46f2b20d1f500efe4ed1476206ad00c33464c6a94
SHA5123e4734043090bb9a66ea2fa86d0f65eb6e6a83aa3614d6a4538debb5ab56c8d90575827e7828996bebaf0d637a669053d700590cc0a581a5c0659ece7c073bcc
-
Filesize
2KB
MD58fccec3a8e043c5d311c779e62eca160
SHA185a773d07fa18a73c1a685078e03f5a9cff1d2e7
SHA2565d412fd445afc07655f783e70b2b645e72ebacfe73796dbc54f31422281cb9d9
SHA512eeaea8e46a5766d75f1aa4b07060fadd99275b9d29ad4a28ddc7e815a2d29d3ce8a87dc1c334ab5824778040e9ead1d1cd1bc61400b35d53352b73d358cc9d09
-
Filesize
6KB
MD59b4767785cdaa1d57827dd7fc827e40d
SHA146d1f12cd16d4c0b3cea280c6f23494ea1ce11f4
SHA256256032df43adc560ef945bb61065dfcf3632c134824c880f1dfdad411475c756
SHA5128cd7585e0975d03b52836ac8dec732cf8094154eaaab1f4a6bad4d4a7bae29bb411d3794385f7606e49ca127f8364eaad69c9d9bf8a5dfee0f2d24c1dfdfdb3d
-
Filesize
6KB
MD5a820580136be2c4ced8c9689ea2be436
SHA102eac37fa882d5d61884ba1cb67e0c0ea533fae5
SHA256c45618cbaba03ebbb9f08e5934cea90fc5dc7cfcc3403979f0ce506d60a65123
SHA512ffc406ab8738275b83acb134b57fc83141c846638d33614bce388974e9c4f9b401fd776611b8113de6743ac919b8628900021b3b6ab9801396b046327da5da4d
-
Filesize
101KB
MD5358f2aea43897193f115b69fdc03a54a
SHA1c96cffaa2d5abd7f6867f598f05b30442cb49b21
SHA25630247ce4a39035c76d205572fce1f3a05092918da53cbead463e8a643e2ab204
SHA512e9ef543f5b39025995136ca0951f0f89a6b1882857b5d5425a762cd27a2f3f5e87af0dbea7cfe579aa93022e5e2e449c1fa3e425fa1a50c8f752f23f4d3dc6c3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd