Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 14:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://workday--c.na140.content.force.com/servlet/servlet.ImageServer?id=0154X000003vdkH&oid=00D300000000d4O&lastMod=1670555898000
Resource
win10v2004-20231020-en
General
-
Target
https://workday--c.na140.content.force.com/servlet/servlet.ImageServer?id=0154X000003vdkH&oid=00D300000000d4O&lastMod=1670555898000
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434091391937081" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3916 chrome.exe 3916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe Token: SeShutdownPrivilege 3916 chrome.exe Token: SeCreatePagefilePrivilege 3916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe 3916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3916 wrote to memory of 2304 3916 chrome.exe 86 PID 3916 wrote to memory of 2304 3916 chrome.exe 86 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 2308 3916 chrome.exe 89 PID 3916 wrote to memory of 5104 3916 chrome.exe 90 PID 3916 wrote to memory of 5104 3916 chrome.exe 90 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91 PID 3916 wrote to memory of 2040 3916 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://workday--c.na140.content.force.com/servlet/servlet.ImageServer?id=0154X000003vdkH&oid=00D300000000d4O&lastMod=16705558980001⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9a209758,0x7ffa9a209768,0x7ffa9a2097782⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1896,i,13536805982482534730,15413870509101090968,131072 /prefetch:22⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1896,i,13536805982482534730,15413870509101090968,131072 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1896,i,13536805982482534730,15413870509101090968,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1896,i,13536805982482534730,15413870509101090968,131072 /prefetch:12⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1896,i,13536805982482534730,15413870509101090968,131072 /prefetch:12⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3900 --field-trial-handle=1896,i,13536805982482534730,15413870509101090968,131072 /prefetch:12⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1896,i,13536805982482534730,15413870509101090968,131072 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1896,i,13536805982482534730,15413870509101090968,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701B
MD58a491c385edc38802cad6dde1d7b1f6a
SHA1fa5857df71409a1ebfccd8546ebbb6b17c0ccbb8
SHA2562e91ff7a6c425d666fc615135fb1e9ca5a9f0e5e44a2d065c8e0ccf4bf7feb3c
SHA512b5fb35b5c5ba43098a915089920931d5010efe436010ef6b9f049ac64717927911bf27f512a1eac8ca0bb478796fbd511da45cac8ed2a8c29ca2d41a91b7fc61
-
Filesize
6KB
MD59e7680b31378447942fc73388af06b20
SHA1de050324633593588ab793d54255370e179072f7
SHA256fcc609c2cb9ae3615b6696104333a8afd5e390d9f7ab86f5e36df67779640579
SHA512abc9867c9b6d996f4e4008e36e0012de05231ca46b957f68c7c5d63b3a5a6727433e4c5d06772e12214dabe8a5a88b0fecec6584f06c157f73ea59c7a9c7ca8b
-
Filesize
109KB
MD54162a7d8e9ccc4ffc963aeefe23a8502
SHA142776bcada8787190b1aae9097e9193188759bf7
SHA256594c397dcb293dd709713024e1474a0d39094fe85d855a2dec146cf6a87fbba9
SHA5121da8ab4e8556a3c74961002c03ab1d92752bbb2f1c2fa39b32089077ff48532cb55f759dad2b0070eb902b15237157971bd6940f9762a32c6c2e961c52e15c8b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd