Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 15:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://rum8.perf.linkedin.com/apc/trans.gif?79f92e075f66ccf11c40768c39ec3e91
Resource
win10v2004-20231023-en
General
-
Target
https://rum8.perf.linkedin.com/apc/trans.gif?79f92e075f66ccf11c40768c39ec3e91
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133444486721840536" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3108 chrome.exe 3108 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3108 chrome.exe 3108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3108 wrote to memory of 5044 3108 chrome.exe 81 PID 3108 wrote to memory of 5044 3108 chrome.exe 81 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 1000 3108 chrome.exe 89 PID 3108 wrote to memory of 212 3108 chrome.exe 87 PID 3108 wrote to memory of 212 3108 chrome.exe 87 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88 PID 3108 wrote to memory of 2000 3108 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://rum8.perf.linkedin.com/apc/trans.gif?79f92e075f66ccf11c40768c39ec3e911⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf5369758,0x7ffdf5369768,0x7ffdf53697782⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1908,i,302530800243257849,12064164546967027477,131072 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1908,i,302530800243257849,12064164546967027477,131072 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1908,i,302530800243257849,12064164546967027477,131072 /prefetch:22⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1908,i,302530800243257849,12064164546967027477,131072 /prefetch:12⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1908,i,302530800243257849,12064164546967027477,131072 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1908,i,302530800243257849,12064164546967027477,131072 /prefetch:82⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1908,i,302530800243257849,12064164546967027477,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bccdae58b4f7bda0d2b418025905e1f1
SHA1299f38dc5a50af335893399863a3d303522cc572
SHA256a79eb38ec9c38d992e9e6741b837d8e4cb3d116767110208fa453fc7fb99851b
SHA51287cb19d22af671cfbc3b28bf80c909858c9bd93e7cc3b5ee80924301a2c9d37c848c36491dcd3bb2b14ac964a18568b6e0d1e0a066d38fa113e7a62ad294006a
-
Filesize
214KB
MD51d2276fb215a944ff93b4971594ff1dc
SHA1735679f4726a342ced48512ef694f1e7ad3b5b17
SHA256fb40d8e8417dd42fc456b85314b9db33b70fe580282bc80d49a4a31a7328b076
SHA512384ce9738e035a9524a8827009f0b768ded4d658eecc8e6c9aa8683dc313138c9bc6ac44246cafde1b5cfe22b5c3ceaaaf16f3a3b40b1b9d2b892d28aa961c5c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd