Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 00:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://myaugov-portal.info
Resource
win10v2004-20231023-en
Behavioral task
behavioral2
Sample
https://myaugov-portal.info
Resource
macos-20220504-en
General
-
Target
https://myaugov-portal.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133445686003655489" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4528 chrome.exe 4528 chrome.exe 2220 chrome.exe 2220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4528 wrote to memory of 4416 4528 chrome.exe 46 PID 4528 wrote to memory of 4416 4528 chrome.exe 46 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 3380 4528 chrome.exe 90 PID 4528 wrote to memory of 2312 4528 chrome.exe 91 PID 4528 wrote to memory of 2312 4528 chrome.exe 91 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92 PID 4528 wrote to memory of 3172 4528 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://myaugov-portal.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedbdd9758,0x7ffedbdd9768,0x7ffedbdd97782⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:22⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:82⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:12⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:12⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4548 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4964 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:12⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3952 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:12⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:82⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:82⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5588 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3792 --field-trial-handle=1868,i,6064451834351232394,10823981089672501615,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD51edf0ddc43e03c1402c5000ff698ffc2
SHA1ccfaec1291d71880e9130f32fa97d9f9f5c71cf7
SHA256e20d770424070ec0e5082a9db00289ea1982c3af4554ca7de54ecef9c4a8ffc0
SHA512b3ae6d85ac970dda566303c8d292745eb9c592fe508ee98294182ea967c1b7697dfb30c207966633ca61ef24da27e782471231f21ca2f069c82d646119401416
-
Filesize
2KB
MD57c238c119d6417ddeaab9f07d0f1bd32
SHA159a80bf030d318b1af2b5b52dcbf321175b3aaef
SHA256fc75d796b194c91ac43be5c015c9d9ecdd4af9653b2663acff07ea82cf04968b
SHA5124e800e0372be4b7bc56dc7ef49c271baa39d2596675f1b89fdaaf9bb64d1ad08dcf1b386140f17679028d5318da09b2e262d92f4d659e3986e004eead7f88737
-
Filesize
6KB
MD5e3db41bbf7a8863f4e28110695702d4c
SHA1daabbd21feb07d7cbb064f8338fef66d20882502
SHA2564f2d45475b2ce473eee239c02d155d58c78f613ae25df74755aea4bf842bfe1b
SHA5129e1e85d53002846030e737ac038749d814f4313666fca786a34789f57b19555e87a221b99082c504787b7d9bd7392dc21d86c3845012ba66744f950477acb6b1
-
Filesize
214KB
MD5f1446c7c8f4e8fceea9a16a5ae942639
SHA1df35af94d4539d8dadd58c4975883e0ee1fdd909
SHA2567cb741914023c83081b1fc7fb199857a55865d1f720d25d34180f16c082cf628
SHA51214214876c574b102d7ac3a627aa0c1e5da4cc58d42e3f9a63d4728c7b6f368909528230ab48b4209d3aeffeacb3656a89b13cf47a31c9f79bca1480c3116e207
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd