Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 12:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://facebook.com/122109645122102427
Resource
win10-20231023-en
Behavioral task
behavioral2
Sample
https://facebook.com/122109645122102427
Resource
win10v2004-20231023-en
General
-
Target
https://facebook.com/122109645122102427
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133445256463245039" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 1544 chrome.exe 1544 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 972 5012 chrome.exe 84 PID 5012 wrote to memory of 972 5012 chrome.exe 84 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 2040 5012 chrome.exe 86 PID 5012 wrote to memory of 4356 5012 chrome.exe 88 PID 5012 wrote to memory of 4356 5012 chrome.exe 88 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87 PID 5012 wrote to memory of 5036 5012 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://facebook.com/1221096451221024271⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c45c9758,0x7ff8c45c9768,0x7ff8c45c97782⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1872,i,4249171198997145259,4004188580592398406,131072 /prefetch:22⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1872,i,4249171198997145259,4004188580592398406,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1872,i,4249171198997145259,4004188580592398406,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1872,i,4249171198997145259,4004188580592398406,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1872,i,4249171198997145259,4004188580592398406,131072 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4548 --field-trial-handle=1872,i,4249171198997145259,4004188580592398406,131072 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1872,i,4249171198997145259,4004188580592398406,131072 /prefetch:82⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3200 --field-trial-handle=1872,i,4249171198997145259,4004188580592398406,131072 /prefetch:82⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1080 --field-trial-handle=1872,i,4249171198997145259,4004188580592398406,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768B
MD5bc29c222a28d3ef30ef6b7189ba70d65
SHA1f0d6b8f13916148b5fabcbc04ad125425ca908f0
SHA2562a6ac4c6d5132f1cdd8f431076dc14096838b15d4f0a48d79cf21c968acdea42
SHA512616cd3a3a546fe416ea1ff6a33999fbee28a80beeb7990496614c62f311f241d92b04862dd9160a861bf795c5e5a4684f1a9e67ae67e6d622a690a7e34852eb6
-
Filesize
2KB
MD5b850cfba44222392030d4d07f6ff75f9
SHA15b6d405393ed4b31ad8be814c6e5c638f5b87b9b
SHA256cd9ff3cd4e0ff4b20ac79d92f44951454886461e09a796f9b088c1032d613d80
SHA51295aa44f336a7b1e3b8ca8420759a802534e68e72405daa6fa4d61be233fc80059bec4d4a5179c5567497b26d58f75048f9304eb51c77436056767ef75ffc3946
-
Filesize
704B
MD5d465119fdd2c2de43a3eb66da95b9893
SHA19c3f4537ee9244ce1e80ca2907f92a9d810b64c0
SHA256ae220306af98559718e7f5f03800929c4985056683a4db1d424f446ce38dcad2
SHA5121e1245679a76a3b37f436ee3e61c02fff25463939a7eae1eb22426a368eb5b4641ad8233a50ddda4fae87b86ca1fc9492ba0391a4e4c95b83f4ea2fe585c114e
-
Filesize
704B
MD53799c8bed0612a510733afe7ec41cf85
SHA1fd50a0ddbec28d9f46134ac018c84cdeec71b45a
SHA2568f0d0ccd0fd2ddb3045de1a97df5a1baba61078f5d5a070a9c5316d306160442
SHA51285395d401d3cb1aff9665f73d9e7907965364a4731fbe5f1033c6a8e7ebd4d61e4d9512f120520d9a4c88670292f66989ccfe26027a89fa359acfe1cbcb77223
-
Filesize
704B
MD5e772c08b36b6b8824d7c8ee08c10cdbf
SHA18fe76945605c4e27bdc817d06033e3ac66c946fc
SHA2569546739bf6e757df3208eb3c0dfe6122e8f76d7954745af47fdc46bca85ca621
SHA512adec0399a5f873ef46bc8cc1014686e0d6b03c997f589fe7ca34ac45cc26961b9a866ebab76e2b5296e3305e37fb402cc3882105b0089d6ee0267a48f8eef1a3
-
Filesize
702B
MD571ae11b86f56ee81fba506a123964eae
SHA186fe31aaf8f09232ce7705e531d40c78cfbab084
SHA256e6989497730094a07d604cd017d4a65556d73ccffdd7241abbcbf6a5b0c42cf8
SHA5120dfc8a1f990b0c0fe01e0b28aa9fdb7ec6a3f4d4824680328ec5f086aef7195fcde781f9cd3c43614ada3f5810c4b0828584b58a2f7a46a459e01f874980fd56
-
Filesize
704B
MD5847c2707ec1aa82d373348d018008e9f
SHA12ee101d84449a27699cebe009ff3c318816a3e12
SHA256f94e5839177a798a8e480864f6011be584bdfe4ba9ea143466e580b589867f5a
SHA5122b392a8776289e4e1dd8051b256aecfccb2abde5396022f24817b71623077ea0260a97574c46e8838b234d75e51e1bb693c52ddc4c0d3cc08117d7cdd779ec62
-
Filesize
6KB
MD5b56ae4d057c0dcf06a944dd23e411e54
SHA13c767e17f8170b5f4baee8c0bc3844b7ff1908d9
SHA256d5f45b43a126b821dd104be70112c8c7c690a43ea87060d9a39ee246a07ee737
SHA51227514393174546290b43fe73dee1ee483394228f1c5321661aa6d46884a4a8f5e397480682d0addb42fcbddf01298dd0be5f5b69c0d9c3c73ced6a5f4ff620b8
-
Filesize
5KB
MD5be2c0581deea63d17cf995868c1315f1
SHA1d7e1a7680b1739f8f236c515beac1f0caceada2d
SHA256b7d671ce7e8a6ef2fc8dfa50f8bffb2b2fcd3a6c720156d563a120e13740b691
SHA51252f0d40c82d6a19c384a1779b17c4c172c10318f4d0e473e36a551f958a82673ca3f5f86026ecd51ab5f39b2d2d53d034345bdd378ffa971b0e541d91a522e5e
-
Filesize
5KB
MD500424b25d56e872046a17e168737e751
SHA1ebc5bd8262b8aa7b49831eb4fc29661736aa8556
SHA2567827ad1a7601b497763f22ea99bf84ee89d5fad1081e920e577cdb2a46cd5844
SHA51283fcb3f8501afac7fec8b0fb3bb18a8bed1180641d39972faa0ed8f2f6dd681d7ce3313d19a50092c312b45bebf814e2d53a24724b7b72d6258e3e0845b472f1
-
Filesize
109KB
MD55d48b3990de7b812f6a3b60113401c12
SHA141ce3a475765aefea7bfb5e9d41ad90e016c4f29
SHA256481cb171df0f06ba411b646d332d6d0728d63dc106e31d5fa369e586477c5473
SHA512014b41518e2d167cb20acf62a64527cfcdcf911a520993dde41a03d610fa247decebad8172da01439accaf49f094ec3802799ec9ff0040fc0e8d061d400a376a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd