Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
238s -
max time network
243s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 18:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://topurl.link/LAVwN
Resource
win10v2004-20231023-en
General
-
Target
https://topurl.link/LAVwN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434225668623471" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 1876 chrome.exe 1876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3792 3592 chrome.exe 85 PID 3592 wrote to memory of 3792 3592 chrome.exe 85 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4368 3592 chrome.exe 88 PID 3592 wrote to memory of 4700 3592 chrome.exe 89 PID 3592 wrote to memory of 4700 3592 chrome.exe 89 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90 PID 3592 wrote to memory of 540 3592 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://topurl.link/LAVwN1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d5739758,0x7ff9d5739768,0x7ff9d57397782⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1888,i,12547275183337148882,7633922902172563738,131072 /prefetch:22⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1888,i,12547275183337148882,7633922902172563738,131072 /prefetch:82⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1888,i,12547275183337148882,7633922902172563738,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1888,i,12547275183337148882,7633922902172563738,131072 /prefetch:12⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1888,i,12547275183337148882,7633922902172563738,131072 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3880 --field-trial-handle=1888,i,12547275183337148882,7633922902172563738,131072 /prefetch:12⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1888,i,12547275183337148882,7633922902172563738,131072 /prefetch:82⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3896 --field-trial-handle=1888,i,12547275183337148882,7633922902172563738,131072 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2652 --field-trial-handle=1888,i,12547275183337148882,7633922902172563738,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5cf8920867abdf39ed39e9341a144f57b
SHA18b340bcd511fc0bac293e42ab57ae85d1a2ca0c4
SHA2567c5d8f5fe08111470fd7033e78553d212f81aadc2053b77d8337e44fa3bc7a36
SHA512243e0240aeb18cac176b704448670517a61561cf514c35f7a81836475d54425b19a96be97df90edf00b2fb4270752e231ab63062166b92197b139fe287fd7fd5
-
Filesize
144B
MD5113e3085b378ec9c26dc551fbbae2d3f
SHA17d25c573d06d08721f5d9eb3cc6af05b078a7172
SHA25615d06ca10150b13cf00f3958763cabd79fd79fcef8ec5250c3f4b2fd877cc436
SHA51265488a29dced5f4f2f907354bd61e35cef3e6cec565ab18905617cb33b27ad33896d60a9c7f1d90755ed7a3aff77a1bbbc8af3c9afce532f594d1391f2fc642f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\8e36b780-2f8d-4f38-8beb-311dc884509e.tmp
Filesize2KB
MD55fd88a51b3d5a2c635d0c633887ad31e
SHA1cb3578cbc1425b76bd1a4778448ee14822789ebc
SHA2567f81a35eea6a762e85bec4fc511aca02058a141ba7eff41d148214f89bdd856b
SHA51240c56052adb03c061a8a523d1133ec0a71b56fc1e9ddca44e2503a5bf7f0785e5a05a3a4c7235d89b8a9d9a262ec08d607a0ed11e771b3de10f1716c028dc462
-
Filesize
706B
MD5b51750059d7abebf6d0ae940233be5a5
SHA130eda4cda5087fe2321df5aa01d157975b9a3254
SHA256353660b23e460917cb01206148645279dddd90f0e2e0cd53781b99a4105f65b0
SHA5121e5f17b990e1b12fe6596a23b5d1f3e878c9960056304c0bed78eea1bddaf119fa08a5f269434a4a47bc023c699aab102f1af1af633c52ee3d1654330f3cf6d2
-
Filesize
6KB
MD5932ff30b40d9d13d244a443f049bdb24
SHA100ef43fdb444f902f6865e6887af71a332309433
SHA256438122165f0112892f1add706e6f23ecaad7b4e6d9a92e7fe59241a1468acdd8
SHA512de6bab9f85de4e51c7c2faeaaffe9fe1b33d67379c2586e68efedd3203f5da93bf8b2a98122ca96b96f25f041c3247445513fc8f87953a272b89cfa9f4c4bad0
-
Filesize
109KB
MD511ce711da503f5d8b8b5b16b7f9bae51
SHA15cc9a17dcc6eec1a82f66081b3657cba8ca4b63f
SHA256f19e12002ac593e7cddf14f81b103e4551eb69ea3c1151810621157921ee770f
SHA512ed82cd919f169e7c774653883b014575d9d2cb888b36224c3ac93f555d1381d13b8686ba39ad050230b3dcd23ef8ed7175a9f60634dc51fe231640e0906bc109
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd