Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
18s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
20/11/2023, 07:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipfs.io/ipfs/QmTWZNwJatzsHx6KFwMBiXSuqG8gDJcP3zMUuZZ1hgcyAn?
Resource
win10-20231025-en
General
-
Target
https://ipfs.io/ipfs/QmTWZNwJatzsHx6KFwMBiXSuqG8gDJcP3zMUuZZ1hgcyAn?
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133449403065391558" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1152 1452 chrome.exe 71 PID 1452 wrote to memory of 1152 1452 chrome.exe 71 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2164 1452 chrome.exe 75 PID 1452 wrote to memory of 2372 1452 chrome.exe 74 PID 1452 wrote to memory of 2372 1452 chrome.exe 74 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73 PID 1452 wrote to memory of 2144 1452 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ipfs.io/ipfs/QmTWZNwJatzsHx6KFwMBiXSuqG8gDJcP3zMUuZZ1hgcyAn?1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa48749758,0x7ffa48749768,0x7ffa487497782⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1984 --field-trial-handle=1852,i,5870323719729193550,10734378336364142915,131072 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 --field-trial-handle=1852,i,5870323719729193550,10734378336364142915,131072 /prefetch:82⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1852,i,5870323719729193550,10734378336364142915,131072 /prefetch:22⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1852,i,5870323719729193550,10734378336364142915,131072 /prefetch:12⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1852,i,5870323719729193550,10734378336364142915,131072 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1852,i,5870323719729193550,10734378336364142915,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1852,i,5870323719729193550,10734378336364142915,131072 /prefetch:82⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872B
MD5127ad58a1526209e540fdc6c7d8c1e82
SHA175b58594deb20f88493cccd46abd509071b56568
SHA2569fb80c2e24c2f1535e2bd83f9ded76f348162f27e65151d2b1df80ba77c20457
SHA512d754cb53a789f64ac670f6b8f8724602e9eb15ad2b744e628f93508b41221a88eeff78d71be52df4705ff9c53b18ca5cd24a4a388c2e2267a86622907d620857
-
Filesize
5KB
MD55bfd13568e1d03f4c3be70b90285227f
SHA10db8d33602d5c268a2ac5d217acc822a83c8e3c0
SHA25651f036f3e3685c7cffe9419f96602902d4c680feea7bc416f2e130c53baacf4c
SHA51226f53649db053b561b05dcb3b1b075015847063c829c7f58f4dff5f0a88216208609a27e7440be474dc6ae4ee42f7a28c922861faf072883168a537f33b81b32
-
Filesize
109KB
MD5597476c3cc323970b2056a2dac8e4466
SHA1b63f523b3fa9033383c73a3225a46dbe0b66285f
SHA2565820fb91a79983920ef1c11c40f98bf3f932c47bfc8ac876d7cfa763b8c91169
SHA512c305574d14f725e717d2ffc4d788a099e7554c8f1517809acb86798e14a31bcdb9276c15c98cb99cd23b84cddcbd504100a01dd4719180609b776ee092c33531
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd