Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
XVkU1M1NESkVUak5XWVhReE9XOTZhMWcwUlZZMWIzVmFjVlJIZEZSQ2JWVjVkazl2TWxJemVrd3pLMUZKZFdoMFpEUnVXa1ZzYzF.html
Resource
win10v2004-20230915-en
General
-
Target
XVkU1M1NESkVUak5XWVhReE9XOTZhMWcwUlZZMWIzVmFjVlJIZEZSQ2JWVjVkazl2TWxJemVrd3pLMUZKZFdoMFpEUnVXa1ZzYzF.html
-
Size
485B
-
MD5
2c42775b2a328c445b7122b571378437
-
SHA1
1c0efd0b31bc40aa0bcf66ea226a708e1df98b70
-
SHA256
01a432b43b929122a2c355002baf21a439b54020a72bf041b481053e3af0138b
-
SHA512
83c8de2d7061ef37140d671a32082494cdc28808b93e97350c0d0a5bac9479f21aa95d1bfe26caad5a31ba68cab4cc598f1f7924ebc1f27bd8cbce4a96860704
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133408028635281609" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4424 chrome.exe 4424 chrome.exe 3552 chrome.exe 3552 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4424 chrome.exe 4424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4180 4424 chrome.exe 33 PID 4424 wrote to memory of 4180 4424 chrome.exe 33 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 2460 4424 chrome.exe 87 PID 4424 wrote to memory of 1524 4424 chrome.exe 88 PID 4424 wrote to memory of 1524 4424 chrome.exe 88 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89 PID 4424 wrote to memory of 1272 4424 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\XVkU1M1NESkVUak5XWVhReE9XOTZhMWcwUlZZMWIzVmFjVlJIZEZSQ2JWVjVkazl2TWxJemVrd3pLMUZKZFdoMFpEUnVXa1ZzYzF.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4e419758,0x7ffe4e419768,0x7ffe4e4197782⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1860,i,5535892653014331742,10643864525021488926,131072 /prefetch:22⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1860,i,5535892653014331742,10643864525021488926,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1860,i,5535892653014331742,10643864525021488926,131072 /prefetch:82⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1860,i,5535892653014331742,10643864525021488926,131072 /prefetch:12⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1860,i,5535892653014331742,10643864525021488926,131072 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1860,i,5535892653014331742,10643864525021488926,131072 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1860,i,5535892653014331742,10643864525021488926,131072 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=824 --field-trial-handle=1860,i,5535892653014331742,10643864525021488926,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4104
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3868
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD538ded6c95ea37f7f667cf4aca83d6af5
SHA10525d1c2cf5b31f4e5178bb6b5a0689729152414
SHA2568e105eab5e0fd5fed1f2075ecfe1e89e6f96b1fa3db45269c568fa2f6f198439
SHA512e1f0c684a393490baa107a9df34b4854fb577ee23dc5fd58eaab8640bfd04601e88ac691c5129a028b31a6662a096d8ac25e6f7ec71740b934ed8eaa865eee79
-
Filesize
6KB
MD58a5e6a1849c2616f6afa1d313a0fdd7c
SHA1cccc4576b6619959783d5bf4b7fb2442eacc4657
SHA2563d3285bec8474cff81f6929e3998ad5f5049801e973eac60b33e7b550945a1f5
SHA5126bde68b83293aafbb79490994370a5cbc22d1e6d6659cbc929487be62a00e892ef23a40adf0fdf2f573ffeaf5ce3318038e400a5507673f290869946c4f1b4e4
-
Filesize
6KB
MD56d3b5989edcc800f7361fc70a423d0cc
SHA1ecd1f9ffb750e226f79a7cb8d125fe79b59192a2
SHA25619fa01b27b628163e4f9f9f315db18ed7526b766a1532a8e5c2f14335ab02a4c
SHA512cba881a39bf189e9e2d5c87a5718c4432881a954c4ad85b69cec08d46fed4c32aacb4a4b9bf0d18290d48a02479e667f8e13677d9c29a83d80de174c5be806de
-
Filesize
101KB
MD5dd4eddcb2ccc5ae7be2cabed800b4a63
SHA1c0dc8c627f7490fa8b3365f3f2d14f6d35f76651
SHA256587986fa8666237bf9e860186c7b79f5f4d087ffffc8b71c70f1fdbc76dfa8bd
SHA512158e017a9a0d4769e94e9e786d57baec47f2fd7b54e1d9713519d22c14e55356cef73987750d9d0e284321bfd8156839be19c43141e0eb27bda1863f25c17af0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd