Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 14:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qrplanet.com/user/activate?i=15425270a97b5ef93ff9c802f920a5a5
Resource
win10v2004-20230915-en
General
-
Target
https://qrplanet.com/user/activate?i=15425270a97b5ef93ff9c802f920a5a5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133413352992570594" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 1684 4868 chrome.exe 53 PID 4868 wrote to memory of 1684 4868 chrome.exe 53 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 1508 4868 chrome.exe 89 PID 4868 wrote to memory of 2980 4868 chrome.exe 88 PID 4868 wrote to memory of 2980 4868 chrome.exe 88 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90 PID 4868 wrote to memory of 3332 4868 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://qrplanet.com/user/activate?i=15425270a97b5ef93ff9c802f920a5a51⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaca649758,0x7ffaca649768,0x7ffaca6497782⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:22⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:82⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3132 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:12⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:12⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:82⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:82⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5324 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5340 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5512 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1880 --field-trial-handle=1896,i,4356829427403785023,8942603714478767705,131072 /prefetch:22⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD500b8544a3c60d5c0dd2ed3fbf3c7e876
SHA19d7a221403bdc17d6a76a739cee1c4c3e6ce1141
SHA2560f9b80ccf67f06cb697e89b51eade4f7a51db3e9a210de70e6a0cc3b5dde5631
SHA5127aae908aa81e6bbdd91fb81f11a345b94d4ecb8f41175fa324a484dbd1bc2d7b9484a081c31d209a4ed0df6407aff7f5a274941823c49d33a97853b76b6c3c98
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\9fb44412-e72c-4bf4-8a2f-2a5a2656403e.tmp
Filesize1KB
MD5271d963d3d580bad046dd4f0f26b7b9f
SHA17bc8a331d541b8c692715e79b68864a36d5eec9f
SHA256d20ba92888d45e62e8c3aeefe96aa8a94d2e197d31e7c461fa3a434f029f943e
SHA512d64280acf015b0c4a15900aadc9924f31af0251f1bf5a49b2f992919124e9623b1c3f21ff4492e11b373ad860157955e2eade3f70a49c941759c3ce62c33fd41
-
Filesize
1KB
MD53268cd3523d3cf8319c725ad38696086
SHA148fb626005e4a1de560a891553f8fe9f5d247b8c
SHA256ea3c08ed384896883950b9be4d179e8a7bcafd2d1501a3fa3a86912877a08a30
SHA51293a616021725c3697e71a57aa6a07a9a4fdcab31304a20b713bb247582d2836503fb19fdaadc9aa1d50faf7b8e92c976590cc1a44971e21ad0bbfd1e460b3d8f
-
Filesize
2KB
MD502560021d0848a426be1dda178b20eca
SHA10e1615f056e1b9234525678734046adeefd2333b
SHA256e0fa7e03d1e360249276acecae19a9777a3968e8956f1581621c4411b5059a88
SHA512b24c7226a41b53952603225ad1c311332a5b775989049a794c3994bc38d865d9996a9e34a18b7c49b8d907ae6c0b9896431a2c0336a688e9fdadebb14a6f7bba
-
Filesize
872B
MD54f29abfff8cc0618921e4bac60795f85
SHA1c17f9adef7730fcc37435238ef05327e10fa0418
SHA2569b76b121333de163cdb43abff476989fd71f4f06be189056c4715824377f45f1
SHA512e5fe2920942dce29884a863cc5be0bc4e10940ef696a4e969186fcbc993b96bee8a91ade331a435d7a6b0a0fce2567fc0b81f70caf132dc88d610dea48c57be6
-
Filesize
6KB
MD56db3eb4b50c7c6a7706e484d23d0a424
SHA11fc5086f24d0d06c3c55ce1e87a7a14153c35d9f
SHA2562cd29a5b0d560b09ea9f012432d4397a5604b5db19b5d2f19e2a96ce7df680e2
SHA512814f52204545bcc3e257026aa80e553b5a3228eb6b8e2ef2879d03d599e1cc3001dbe6a251dcb61be38c54b63866eaf4a7a36f293f80d221f0b43a6a78768dcb
-
Filesize
101KB
MD5f09a1d09e1b91bb2a7b446e567ce65de
SHA195a0d104f4f1bb3c1b29790b4a25d13f9ffdfb5a
SHA25601f5b231710467babb72d1129e215a7efd3f7afcf47ffecc5425768423c63386
SHA51201c306a48ae10b7dbda75accf79f8e897ff44d9655d1ab971b9c218fca579cdd3853823f5c13a1749616ddd8c471cb350375522202ab26e4bd00572ca5570f9b
-
Filesize
101KB
MD58ad8fad1c29effcdbef4734be4187105
SHA1e39bfe8e599be3adb72257689f58ea1c7a24de8b
SHA2561dffd7c32eed4dc25e491a6ff8403b8d0930d1813f0488d32d332f599933d22c
SHA51203f88b73ad228ea295ae41ca6e896359cbec726de4ad9b69d99c203d611b1dd6d68de53d292a27a975c4f19cc46fad5179e377ca0752c85b17bb02596070c67b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd