Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 08:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://live.paloaltonetworks.com/t5/customer-news/schema-name-changes-for-cortex-data-lake-cdl-customers/ba-p/564177#M49
Resource
win10v2004-20231023-en
General
-
Target
https://live.paloaltonetworks.com/t5/customer-news/schema-name-changes-for-cortex-data-lake-cdl-customers/ba-p/564177#M49
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434754856730163" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 620 chrome.exe 620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 620 chrome.exe 620 chrome.exe 620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 620 wrote to memory of 1900 620 chrome.exe 90 PID 620 wrote to memory of 1900 620 chrome.exe 90 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 208 620 chrome.exe 93 PID 620 wrote to memory of 1796 620 chrome.exe 94 PID 620 wrote to memory of 1796 620 chrome.exe 94 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95 PID 620 wrote to memory of 4164 620 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://live.paloaltonetworks.com/t5/customer-news/schema-name-changes-for-cortex-data-lake-cdl-customers/ba-p/564177#M491⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7aa69758,0x7ffc7aa69768,0x7ffc7aa697782⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1884,i,16894131294096719529,4918573969556623103,131072 /prefetch:22⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1884,i,16894131294096719529,4918573969556623103,131072 /prefetch:82⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1884,i,16894131294096719529,4918573969556623103,131072 /prefetch:82⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1884,i,16894131294096719529,4918573969556623103,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1884,i,16894131294096719529,4918573969556623103,131072 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5168 --field-trial-handle=1884,i,16894131294096719529,4918573969556623103,131072 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 --field-trial-handle=1884,i,16894131294096719529,4918573969556623103,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 --field-trial-handle=1884,i,16894131294096719529,4918573969556623103,131072 /prefetch:82⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD59c713e57d56a5debaf929c67d16bcd76
SHA146bb740a322fdb3fffd827c62ee150f14a304ae3
SHA256ca7f9b2466e63bd3d3c3a613bdcece6b5ee51f52a73285e4fc6d6ff6eee80116
SHA5126f81d9b0ca382de9ced5be9321eb330402f410101f4ac7154bdf8812acf069ddb41960d5e490e36d04575718a8871bd8711e3747c8de57657ed5ddcc1b205471
-
Filesize
701B
MD564f3bee194769c5511a7d0364482ca06
SHA1db145c6f86cf0c04955bedc8b816135f42b916fc
SHA256bb628fd63a96707eb41c7af998b83dd729651ce85bdcecd880758a5ae442a8e7
SHA512eaffe3c1cd8abcd0fb8f3a426cfce9a840d769342aa75c31dd48552efea8b2b727b7e290f0b2bd3870fe6126ced25d428a4a58b130c1cf9b07876f217048c7b1
-
Filesize
6KB
MD5a9c7e1a0c6893e5ca4455cbbcaf83009
SHA1a329f638de7b19ab885ee845c384816bd0d371ab
SHA25687d4b652159bbf74b8416350fc6771787a3075d555ad69e147913dcb7b751161
SHA512e443416845d68f3c713f22e47187746ac74d67b3b614f9401637f76ca51e4e469e15abafc86766618c2d7c24ccaf7d6a2333674d094630bae84a335d7814b1e3
-
Filesize
109KB
MD5fc83f18d0211ed0c0878f4bc5ca7f9d2
SHA1fd4359131d27f280b7b19d8235a04f6dd1881202
SHA2566f9c25f7e72a9ccbdc3398cc1cfc97a0ad47fd0cc3f485fc062b34770bb6d12e
SHA5128dcb15d2bbd90f22ef499ba8b6175fd30c8c6df6ad2c379cf206dc43f05b89ce5fba1ab99fe2f4821669e85b1fa94c44fc2ec5222afa5b93303593a08d4ee7a5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd