Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1696s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 21:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com/
Resource
win10v2004-20231020-en
General
-
Target
https://google.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446458315227804" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2020 chrome.exe 2020 chrome.exe 4536 chrome.exe 4536 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 4924 2020 chrome.exe 88 PID 2020 wrote to memory of 4924 2020 chrome.exe 88 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3620 2020 chrome.exe 90 PID 2020 wrote to memory of 3764 2020 chrome.exe 92 PID 2020 wrote to memory of 3764 2020 chrome.exe 92 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91 PID 2020 wrote to memory of 4936 2020 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://google.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4f6e9758,0x7ffd4f6e9768,0x7ffd4f6e97782⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1896,i,1440406136957149559,18420522788004551608,131072 /prefetch:22⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1896,i,1440406136957149559,18420522788004551608,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1896,i,1440406136957149559,18420522788004551608,131072 /prefetch:82⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1896,i,1440406136957149559,18420522788004551608,131072 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1896,i,1440406136957149559,18420522788004551608,131072 /prefetch:12⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4620 --field-trial-handle=1896,i,1440406136957149559,18420522788004551608,131072 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1896,i,1440406136957149559,18420522788004551608,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1896,i,1440406136957149559,18420522788004551608,131072 /prefetch:82⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2648 --field-trial-handle=1896,i,1440406136957149559,18420522788004551608,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD55c71f991b1ec7641ee01bffffc92fe14
SHA17325862e53ebac0694d950e6057256bf9150a5d2
SHA256e0b1daad263e397267fdfafed408bca8d5dab32bd71b83beae126d303b12b72f
SHA512897dbd0b940037ef4422236b4067e31bd81a76f2edf077debb963eaca0937069933d27350caf59953e8f8faf21e4c47219f17e03ebc4806453affc43e5816cc0
-
Filesize
3KB
MD5b8485293c457a6af7039f002420de7bd
SHA10d3ee1ccd3a58d93a443ccd88cc7250ad81242a7
SHA25640f568daaf753e99f35af40d3895ccb638efd186649ce12bb7cd37624824ccef
SHA51220d0525b9df8b3379375f4dece45688bed8113cf13d6108776cce507dd32926019be25c74a358eb7b48c8456a6a6eb982db3613ea07e6dbe379bd313debb16b5
-
Filesize
2KB
MD5b5f71f11f0a0d3bd30d5ab3a93d88538
SHA196d7416d6895491f808069d4646b1bd4b028c523
SHA256f1227e2c81b59dc13657eb0c19f4f81a6fe9c09b5cdef286777a47d4e9670269
SHA51245b9ac52cb9150f3361ac48cd839b6fc2dde4e2cf167deee4d47c8a15e7f506765d58b7495b808cc1c93ae28fb55b0a58df60ef022a8685cdeeffffddc71ff11
-
Filesize
2KB
MD5b4fed39e78c80842f67049dc73a08f64
SHA12667a2d0763e141fbc01a89b6c384cc551a0e753
SHA2563b05ee195025cd73442a3e2149b590a9c9bfd4fb349983fef8a730d2d10bd5bc
SHA512fb8d0f6fb7f8d80be42bbb1cc2325d36ed8c101c8595766c6af47d05cb7e274489f21231223108540430d62f425eb913467ac899bdeaee67e87c3c087662fd3e
-
Filesize
3KB
MD55c51425320c4286ef98fea4db22be2dc
SHA1a7ac7f7eedc2ea20d0c2a30cebdccd1213270003
SHA25658a213496b2cbca02826b12c19cc523ef74439a894356526748a481df038db88
SHA512c4e6622657752556c0c0aee05acee05301c30a703323de39442deea60d35e732d2f5a2108df10d8d2ec30481c1f3c5eaf51f3d7e74cd09aa9ee200e23d67ff9d
-
Filesize
3KB
MD59149df0622b2a3208e8b3b3b3ebaf712
SHA10ced8f3fd28442d6198d650072d318258ff42ac0
SHA2565d8c6336e5c490056c0ce9c9cb610adf3bd2285240981e92f025702ac5badc88
SHA5123f6e417618a5bb6b6e47bd74527966917a0550f76c0aeb25e164464d4185ee453e3fcbd95638fa502a03fae8bfa9c79bfd6e459daa1a41a267bd0e11ed42cc13
-
Filesize
539B
MD5540368d968bb7efc8a7e5f3dc65d2e80
SHA1e07374f5c8bf2fe928fc087c2b68700075aa1c3b
SHA256bd312cd5456e0e399155e68ccdee2d1c3774ad834319278c02cd70760a013114
SHA512cc59985606fe93ea9386370a05a3475705cd144a6dc3356c077e65e4eeceec967f207413d09d4c412373024210f964150697c49ca7c13f90b20bebe33461c689
-
Filesize
6KB
MD51a85b84cf5a98dca151cc5c8de76b655
SHA12556d45405182b49c076650ac9b9584c28824fa4
SHA256b5903326872503d84228383ae10a313aca91ab669ee7858c5029075d578d93ba
SHA512220946f81522903c25d2ead71993e464c0b76da17f07a169f7eb5bfa207cd05df5c4491ed266b7f207b3536ded2e250cc314ac0e389ddb4e082f932c244e05b4
-
Filesize
109KB
MD54ca23110f59d289e276a2252a1e11fa2
SHA18cebaa27782a1f7e2e87b572a98fca72b5553cb1
SHA256dd7a8b39bfcb28fe63dca79e68b7712634a57e0eb281fac0eebc4711291b9bb0
SHA51284a68f0bef11370dc6db811ba6114a7271217ab9f9991c3ca5998b92d4be695b78942c145606e96b973b7fd09ce8208b95df6c552b98c70239b921c2e9283b7d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd