Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 20:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://security.microsoft.com/v2/advanced-hunting?tid=7f17b26a-7110-46ab-a570-fbc53306129f#
Resource
win10v2004-20231023-en
General
-
Target
https://security.microsoft.com/v2/advanced-hunting?tid=7f17b26a-7110-46ab-a570-fbc53306129f#
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437763920283892" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 860 chrome.exe 860 chrome.exe 4180 chrome.exe 4180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeCreatePagefilePrivilege 860 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 4272 860 chrome.exe 36 PID 860 wrote to memory of 4272 860 chrome.exe 36 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 3504 860 chrome.exe 91 PID 860 wrote to memory of 1516 860 chrome.exe 92 PID 860 wrote to memory of 1516 860 chrome.exe 92 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93 PID 860 wrote to memory of 2380 860 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://security.microsoft.com/v2/advanced-hunting?tid=7f17b26a-7110-46ab-a570-fbc53306129f#1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff856d39758,0x7ff856d39768,0x7ff856d397782⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=364,i,11167370499853191357,5176060070645416763,131072 /prefetch:22⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=364,i,11167370499853191357,5176060070645416763,131072 /prefetch:82⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=364,i,11167370499853191357,5176060070645416763,131072 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=364,i,11167370499853191357,5176060070645416763,131072 /prefetch:12⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=364,i,11167370499853191357,5176060070645416763,131072 /prefetch:12⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4588 --field-trial-handle=364,i,11167370499853191357,5176060070645416763,131072 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=364,i,11167370499853191357,5176060070645416763,131072 /prefetch:82⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3344 --field-trial-handle=364,i,11167370499853191357,5176060070645416763,131072 /prefetch:82⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3740 --field-trial-handle=364,i,11167370499853191357,5176060070645416763,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5813ebfec55b535aa44e101f55ad7eef5
SHA1b10f752a0f733d77b4627dd54b6d156f4b3c9ff3
SHA2567d7fc3c2bd80a9a68d099b4c0ed746861cb6cc83fca159d3c1f435b901fa3730
SHA512209e5528f713b13446b69569cb80ebeb59a3bf7ba01275293aef4570a3c719a924189113e678a4d813fc143c27c0c1986dd18dbd43991d3061d15a5175055018
-
Filesize
2KB
MD5adc49cfda790a43ede37bff11f68122a
SHA13cf6e58585c335770e17211014c05611a98a1e18
SHA256f7a8ae0706c37b24e359c6fdb8f2aa1df73a8b53095c10438c2c59909a061112
SHA512598ffcb8fd36132c874a01cddd155b2f4c9d07399fb15ef834faa4f0d9fea6e651eae4ce60f65807685ab767dabd8aeb13c426b37ebc750254791b42f5e4572b
-
Filesize
873B
MD500270b645cf207a072f2f129cde310d8
SHA17174b46ae8039f7d42736b437afdb2df323fa701
SHA2562530402cc0af33a82fd88d708415668ff744236c4103793218d7550bbfb94bac
SHA51242fb88dfd6d15367d3e12232c28ce56a73f0db5e3b30e64e9067df7f85f991d20c1b2ff0651595cbc1bf57db29bbc17dd7b333b192cc00eb1423f32613ce557d
-
Filesize
6KB
MD55d30af775d9fd61fe7b53af0b9f9de41
SHA17178dc82e1a274bbfbe0a82958a0c8b92300269c
SHA25697a225c467cc03622c8bf0ead38701fc708587eef7935441add0d7cdfa202755
SHA51217b0e48f53cb9b3747f0ff940a1c456241bd098793400e02eb0f4988c32753d566ecb6e85ad4e411bb9ef03b3bd398debd1ee01068e5e9122de30b39bf589647
-
Filesize
109KB
MD5cf9e2a3671002a02353d53f304ebe83b
SHA1d87dbb662198e9afea99a9655a6ea908d963b798
SHA2562172032d911ff98a43fc0efd65b03f6e08010e955f02823618a3daa1156b506d
SHA5126d01040f12f03dc1127273caf03b205cbdfab1e940131c77f1213a118bcdf387833e6c1e693d883d38564f2f8764f302fc1b896c6c5e3b2a8476af0713b3aa46
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd