Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/11/2023, 14:47
231103-r57ygafc56 603/11/2023, 14:39
231103-r1d5lafa97 603/11/2023, 14:22
231103-rpte5sef86 603/11/2023, 14:17
231103-rlxndsef42 6Analysis
-
max time kernel
169s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 14:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/151SDqbUdg0TFULV0avqXPwWSQL0i3lEx/view?usp=drive_web
Resource
win10v2004-20231020-en
General
-
Target
https://drive.google.com/file/d/151SDqbUdg0TFULV0avqXPwWSQL0i3lEx/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434961078100708" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4004 chrome.exe 4004 chrome.exe 3220 chrome.exe 3220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4424 4004 chrome.exe 86 PID 4004 wrote to memory of 4424 4004 chrome.exe 86 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 3216 4004 chrome.exe 89 PID 4004 wrote to memory of 1832 4004 chrome.exe 90 PID 4004 wrote to memory of 1832 4004 chrome.exe 90 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91 PID 4004 wrote to memory of 4328 4004 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/151SDqbUdg0TFULV0avqXPwWSQL0i3lEx/view?usp=drive_web1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff859a09758,0x7ff859a09768,0x7ff859a097782⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1872,i,11025128800374342047,9648235074170304240,131072 /prefetch:22⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1872,i,11025128800374342047,9648235074170304240,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1872,i,11025128800374342047,9648235074170304240,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1872,i,11025128800374342047,9648235074170304240,131072 /prefetch:12⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1872,i,11025128800374342047,9648235074170304240,131072 /prefetch:12⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4676 --field-trial-handle=1872,i,11025128800374342047,9648235074170304240,131072 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1872,i,11025128800374342047,9648235074170304240,131072 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1872,i,11025128800374342047,9648235074170304240,131072 /prefetch:82⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 --field-trial-handle=1872,i,11025128800374342047,9648235074170304240,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5b6d7a89d9b439f19d26605adea3005e0
SHA1a8b59f40a7ad033a9656ee30cc027403979c004b
SHA256555eb4d2ae11dbb9f3d5a60af8c10100ca74d80243739f12d7461c819d525513
SHA51280807d91c963aaa2b642b584312d93e449a1e1a90460996d7cf23a0619b24e043ded96f1d5b790b25ce5d18beb699ca793534fe611173c07fd49ca74a6af6518
-
Filesize
3KB
MD5ec6365f96cdb7e142f96f9147bd3d4dc
SHA1e615b87a2b8a5287e579204ba67fc3711314d35c
SHA2564d95fb5eb34f71eb24f8e4c5c50917cfdd6c43af7303d733b2724c3a330796ae
SHA512514f8ec204ada6c45c5b9e5031f65557e7bb1577d2f1fd77e7934256bbbb186f962706fcf5be572bba4df4bc908f61c800ff2979825cd61a10259c4857c50882
-
Filesize
3KB
MD5c7d182e2be77c8505be69928b7b4ce7a
SHA142a135577eb661310ee98a5c471aad50790c624c
SHA256f1eabfac5fbdc94516bbedc32a9672fc0dbd1b6f02b78295130721f98d3afb7b
SHA512bcde09d36c29bb469e42b6f8b8dff3436989fa4a0f9436d5236e32970b6269413dfdcbb7463f2d51a98a9cadf09fcb0672197626b5ccb4c0ad47da4257306384
-
Filesize
874B
MD58e3f4485383fbfe9da8425b6cfb006fa
SHA1e44560c110163a049b00bd7046e3d91f0f868496
SHA256a55d7c19fa4b65b4ab4a6665dcd607d81ee0a1f598c71a609ea58f0ba9c9eb0c
SHA51264c04f4dc4b5d791d2c65c5bd7a7bb6e5a98082db229a0efe3b9e37cd527755f968e43685efb4288bd9316f8eff38c13bdb712d0e5bcc8608f6febaa845f9595
-
Filesize
6KB
MD5456caacd038c2d7a00afd862f725dc63
SHA112e6a7b94bc45a205c174fd379c15c988a55db54
SHA25628f0ef080eb707df8eeeb0671463831f083948183fdf750353fefde13c430da9
SHA512b913dbe23548a23c077baab45c49b2213b991dfd124f8f3a4dd5e324b531e8e8bab3f57d368a09095e9750a162e00e017b3980b1db28cabe0b12a2717b6cee1c
-
Filesize
109KB
MD564b8e1660c37110b952e4d57f62aa190
SHA1dd70fb7b576a40f6ec9940aad950364a3d0a6ae6
SHA2567bccc0917f4d8f4bb869fed0100475d3ed572ad46feea7c960f3c9c2614922b6
SHA51267851c2069d8cf6ba6c3dc02d0d6d07909ce3f121306dcb5b2c2ded30b9443b47783dbb676c88feea0a42f39c658d8bfe6d55f33ddf6bb08683c9f3b6ce5a925
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd