Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 19:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/forms/d/152z7Q1GTCdZpQ_0nUnGagQwumPp3ljodJ4fOD8KM1G4/viewform
Resource
win10v2004-20231020-en
General
-
Target
https://docs.google.com/forms/d/152z7Q1GTCdZpQ_0nUnGagQwumPp3ljodJ4fOD8KM1G4/viewform
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133444631173960202" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2664 chrome.exe 2664 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2664 chrome.exe 2664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeCreatePagefilePrivilege 2664 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2664 wrote to memory of 1160 2664 chrome.exe 37 PID 2664 wrote to memory of 1160 2664 chrome.exe 37 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 2632 2664 chrome.exe 88 PID 2664 wrote to memory of 4592 2664 chrome.exe 89 PID 2664 wrote to memory of 4592 2664 chrome.exe 89 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90 PID 2664 wrote to memory of 4996 2664 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docs.google.com/forms/d/152z7Q1GTCdZpQ_0nUnGagQwumPp3ljodJ4fOD8KM1G4/viewform1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0bc39758,0x7ffc0bc39768,0x7ffc0bc397782⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1872,i,7252534525221442793,1578359442788529265,131072 /prefetch:22⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1872,i,7252534525221442793,1578359442788529265,131072 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1872,i,7252534525221442793,1578359442788529265,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1872,i,7252534525221442793,1578359442788529265,131072 /prefetch:12⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1872,i,7252534525221442793,1578359442788529265,131072 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1872,i,7252534525221442793,1578359442788529265,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1872,i,7252534525221442793,1578359442788529265,131072 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1872,i,7252534525221442793,1578359442788529265,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5ca7b50e9eb2623fe9a3780b8ad15c25b
SHA1c3d09674ab9e619cf5c11fc33b6e0f0e1e00b55b
SHA25691d6fd92328f5bb56653a47bde7bfa380ee4afc6d66605b477221f9917231804
SHA51221cb7885ce405f0cda7f8180f1a645216135270ed89477956f800e9e93f4ed875456cb36a212254e865dc2e4e3bfa6dd4d73fd33c991435d09f20b1c385ff625
-
Filesize
120B
MD51ff623dd6c9f30bc9b5e93420461541f
SHA1862cf671873b73c31849bb612e7c78be7c0d64a1
SHA256595c8477bd3dc5c8deede3120d1fabb328e661c495dc98e73d74483b547f1bfa
SHA512d20ffb57844cf33b00353dd40234bac5e76a4466304eeabd0505cec17707b22b4346be671f46e69c4e7a2c2e97464a0aa8f8dde910c827bacd74a36536879579
-
Filesize
2KB
MD5979964657d163ef58d9fd408c10ee64c
SHA1a59c54a20389f23969903fb5c46d4f84ae36e22a
SHA256fc15218e009b0f89c7ca1db3d21bad3c21d1baf24b77a02496eaf819bdca9ecf
SHA512f3012bdb758065523314fa1bd4dd56c1b34f8d3747001a6de954c0ac73a94bd619bf04205b65edcda7e439afbb96d8c9fe4f5ae11e639f3acaa7b7549a681c09
-
Filesize
539B
MD5935a628cd4d2456a93960ebc035ab1e9
SHA1efd8071c2f8ec55f7c9e1feb15513eac1678df6b
SHA256fdeb6a549a891fdea9a0613ab9ed468e9a8ea05949158c966af4892e2c8823ba
SHA512dd4ea1d0e610c510a37d916c6238e5bf290b7e2704550827bf1c0b5d9106b1da1bee1d2b9f1a584ce37ce4b91e0a4a5c84aaab9e2491dc935b88ab2bef74a42e
-
Filesize
6KB
MD51c72b0655260262b6f719f00109ccc6b
SHA1e477197bc9fbfffce007778215bed14d1babbcef
SHA256663d8a8ecbda816b7ef373da15f0441a11c4dcb5af38d4be21ee60f822e44be8
SHA512011f91144b4494cfd1bba8ae7acc4267c678fe3f967c9f327c0b3156b022cff9353877008a2848319e805a41e8e05cb1fb21ce3258db332ee3e2657b371a3f92
-
Filesize
6KB
MD5f9dfc0277296cef1e4a84631015daed3
SHA156f51e8f89e85cf3d9eccdb7d10aa09814e1d941
SHA2569d41cd2bafcfc02a1ed472b21e6bb5e7460c7ef710a02af62a7cd3c7faf7fbe3
SHA512dd2a162a7dd33a8bf732576d49f1a420b804784d1530b5fbf5463316abd499e4f9307441c0c5f726b150481b82bb4ab7f9a42735c1b5b6bf991ee79e964c28cf
-
Filesize
99KB
MD545b53518145e3a0b48cf249fff9e1c43
SHA19dbfc60f011d74973c0f15c6861dcc41aa2a971a
SHA256c1c6589e448d6d7c9887f7d0a2f1d5ebbd9469a2305c0d84e3ad3f1553c81476
SHA51217b27702e937abe8b1cf5d665739192415e57c659ceff915571350f811c4fd6d1f6a16f5ab340673a540ef05f06cb25b487a4d54e18ab435cc807b70a0485427
-
Filesize
97KB
MD5e8a3274e1b79bf7cf74a50a7d42fea9d
SHA10d598f66f5156c65c3b8bdc2433b289d51f81120
SHA256c2c2f86a5e08b4aa26a2492a974e5be8fc199fbc45aa2911228d109cf68adf36
SHA512eb09414b380530b8552f09f1bc7040c9906569b5f097fbfd9eec5e964d7a535cd8c9027d20389b1d2e309e29639d784122fcdd5fc4533e5d045df3b085ce6600
-
Filesize
109KB
MD569aed082ed79b9f4742fe66b31e952d6
SHA19bdb353b4835506b620e73a97496570fb66f47da
SHA256a0c57adba20e9c777313f836343a15d52d28b7a8a8751d79afbcea1e589ca28f
SHA512a12ea95dcafd6ce9289ea5a5afabed8f2e0588f28d41b13ea877615d0194e7d1679c351ac62c1660d67d48df0ddb99683d5b9f34ee41671213dfcf6102ba9af8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84