Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1808s -
max time network
1699s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2023, 21:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://h
Resource
win10-20231023-en
Behavioral task
behavioral2
Sample
http://h
Resource
win10v2004-20231020-en
General
-
Target
http://h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133448156457337898" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 2380 chrome.exe 2380 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 5004 5092 chrome.exe 33 PID 5092 wrote to memory of 5004 5092 chrome.exe 33 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 3200 5092 chrome.exe 88 PID 5092 wrote to memory of 4740 5092 chrome.exe 90 PID 5092 wrote to memory of 4740 5092 chrome.exe 90 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89 PID 5092 wrote to memory of 1300 5092 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://h1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaffe69758,0x7ffaffe69768,0x7ffaffe697782⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:22⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:82⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3128 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4644 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:12⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3324 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:82⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:82⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4508 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:12⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3256 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:12⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3808 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:12⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2336 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4692 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:12⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4660 --field-trial-handle=1852,i,10563550903781335963,16437184070758416582,131072 /prefetch:12⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54b19dedd460a750f373fa2ed5ddbc776
SHA11aa2bc0beafe4aa7801d32f6c5789d3454ce7ccd
SHA2561685005e71ba5ec35d84651fdb9113dc8883f33273fefde51c732cd090bdca13
SHA5125215f4670702e79f8a12a3183e8de57be0e9f16ff6fb7da985d4c6d4466370957e970b73824fe6b64e2395e1057d58b3888cc2c03803a59107728c2c198dac0d
-
Filesize
6KB
MD5e6a1964b97626793bca62d2ac5c12568
SHA1392578e5b97a58798f4c8f8503508f94fa8f1b8f
SHA2569a95c4966fe2aad03ca37b2f2bd96452cd492136b812903e272deb11307e3b54
SHA512719284ca5e64ea004c789a3c59261c7dbe222d20cf538042de00c96fed5a060b89485fe0835bcacf28c79aad7a85577a0a5b5a14b297a6d1ad1f2661a1439af8
-
Filesize
6KB
MD52a8161c933bc74d72f5b8cdd69e61a1a
SHA1a23f0d5e91fcaffedf683d95d88dd4418b5a64d0
SHA256109496b0c37b23274c3ea7c05f6457cfa7c613f566c6b6fb50d7adb6b9b434cd
SHA5124cd248416a7710f2bf35fd25c342c2dff60aff7ae9abb8630ea65e88b9790d6cbae3fc7fad37880895056677e2654196de405c7fbe4cefb618fe332d20e5ebe6
-
Filesize
109KB
MD5cbdecbe66a0fdc4b1ed10e8674e5526c
SHA1bf84e35e2ef26e0547d8db0f59c17bd44e34d5b2
SHA256166f3e8fa2f5aa5cf800c9e69ec27c81021975b2c735a9715cc7c6a94be08db9
SHA512f4202374b110640a77205545d795f40a84ce9781ed5b464190785a2343525dd0472a86a8373a2f63e7575ed20fd5d244a751fbbcdf7af7a2683db178e0747614
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd