Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 14:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://18.238.132.77
Resource
win10v2004-20231020-en
General
-
Target
http://18.238.132.77
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133447036945248862" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 416 chrome.exe 416 chrome.exe 2388 chrome.exe 2388 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 416 chrome.exe 416 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe Token: SeShutdownPrivilege 416 chrome.exe Token: SeCreatePagefilePrivilege 416 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe 416 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 416 wrote to memory of 2452 416 chrome.exe 85 PID 416 wrote to memory of 2452 416 chrome.exe 85 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 4540 416 chrome.exe 88 PID 416 wrote to memory of 1360 416 chrome.exe 89 PID 416 wrote to memory of 1360 416 chrome.exe 89 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90 PID 416 wrote to memory of 4400 416 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://18.238.132.771⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffd93879758,0x7ffd93879768,0x7ffd938797782⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1824,i,7685371029453554233,4455388972414779737,131072 /prefetch:22⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1824,i,7685371029453554233,4455388972414779737,131072 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1824,i,7685371029453554233,4455388972414779737,131072 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2860 --field-trial-handle=1824,i,7685371029453554233,4455388972414779737,131072 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1824,i,7685371029453554233,4455388972414779737,131072 /prefetch:12⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1824,i,7685371029453554233,4455388972414779737,131072 /prefetch:82⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1824,i,7685371029453554233,4455388972414779737,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3668 --field-trial-handle=1824,i,7685371029453554233,4455388972414779737,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eac38ebde7a26963864b9cf50885f758
SHA102ab0d5e4616bce7115530785ff2924e1c90eb29
SHA2569f7367201a127038fee84d46fa3dbd22a1c34d78a02d6fb35bc848c4606135be
SHA512676091b803f026f5b2eeaeca42c45efab705eb1bd03992fe4924916eab7e5ba8f4b85f8ade422f56d036e6cc1ccfeb61001f683ee518967ad63047023ae17a18
-
Filesize
6KB
MD54178a8fc645364760f226c009cf49298
SHA1e0d7d40e930933f4dd53ce599ff100e0d5c81d2d
SHA256864d6f6cb39495c7ac7502919dd0c9a6fa4d93c533354ee04c9772bee5400954
SHA5122decaf07a88b8c678038739512cfdad84c5292ac6b1bc8abbde6bbb19c660ae7264c76f60bb0fd6d5df3db418e5a498c32d0ede3da5b5c503010c600300cd1d7
-
Filesize
6KB
MD5610464d5ddc552810917e842d07017eb
SHA15bea517f655f6f0555da8ae6745951c76460d58a
SHA256696545c5e597b99526316a3633945f635fe61e25b4c96e27da9292ff3dd17a03
SHA5122e97834efbed515fa1348d13152acc285e28a5d562dfbb56209aa5f949f4e0aa41d3f75299b4d01c71c4da11a3e7bc7978f014ca98fc4124f7e74540fab37d20
-
Filesize
109KB
MD5dd95bd5488bf97054867a77b41b8a63e
SHA1142534ca3edf208f10b816bf8e8a785dddfc5bbc
SHA256902a03446cd2771eb69300429f77e81c0c124c8cad56b8813fddd3b3772c05b0
SHA5121f747a0b65a059efa9168cd96f8cc1c5bce3d46a792402a159dde189764fc3898539374a9f6cf943c8817fbfa3e8689279d0abea8064f2c5d8ac4f6311bd5cd3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd