Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
288s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 21:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-eu.mimecast.com/s/7fCiCp8RWiyE1RYtP9Hkw?domain=u19434791.ct.sendgrid.net
Resource
win10v2004-20231020-en
General
-
Target
https://protect-eu.mimecast.com/s/7fCiCp8RWiyE1RYtP9Hkw?domain=u19434791.ct.sendgrid.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450743688983401" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1160 chrome.exe 1160 chrome.exe 1756 chrome.exe 1756 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe Token: SeShutdownPrivilege 1160 chrome.exe Token: SeCreatePagefilePrivilege 1160 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe 1160 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1284 1160 chrome.exe 41 PID 1160 wrote to memory of 1284 1160 chrome.exe 41 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 5032 1160 chrome.exe 87 PID 1160 wrote to memory of 1940 1160 chrome.exe 91 PID 1160 wrote to memory of 1940 1160 chrome.exe 91 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88 PID 1160 wrote to memory of 3152 1160 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://protect-eu.mimecast.com/s/7fCiCp8RWiyE1RYtP9Hkw?domain=u19434791.ct.sendgrid.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb11739758,0x7ffb11739768,0x7ffb117397782⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1880,i,12658344550025619419,8950733373222637985,131072 /prefetch:22⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1880,i,12658344550025619419,8950733373222637985,131072 /prefetch:82⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1880,i,12658344550025619419,8950733373222637985,131072 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1880,i,12658344550025619419,8950733373222637985,131072 /prefetch:12⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1880,i,12658344550025619419,8950733373222637985,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1880,i,12658344550025619419,8950733373222637985,131072 /prefetch:82⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1880,i,12658344550025619419,8950733373222637985,131072 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5284 --field-trial-handle=1880,i,12658344550025619419,8950733373222637985,131072 /prefetch:12⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5152 --field-trial-handle=1880,i,12658344550025619419,8950733373222637985,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD58c68df1df279cb530e2e4b0207790231
SHA18ec4b5c5dd8d54a6630f31440ea136e055a80a55
SHA256322f86a955e9d34957a475a47d0856e535e40eec3c8c546f392166ed3496dec0
SHA51234355c9531c838ed5a888423dd557dd84eeed73f420ac9f5dbbeda30a9758261203a5bb29c654044b031679457b17bc26254532de56e866467b15cad470c4cf0
-
Filesize
1KB
MD5c0504e9d572488e93d9288229e1f40d0
SHA1892ef3fd48d3629c323805a8d713cc7f004cb48b
SHA25688081aac2936813be23db39c5e2e6cc48832662fa79c984396547fa51931e91c
SHA5121faa24fdade11f2eff12e0662bddeeb015687383a2247433f79fa034862b603feb3cc2fc17b3b312ca1a9b1793173e9988cb728a2270d2e46a6ad385be58930b
-
Filesize
1KB
MD5a03bb67541504456803482690ac8fd28
SHA1168948a5b7da7c348c27334e529d854b34e58bc6
SHA256be79cdf35aed15b0bbb4899dfdfb45b84b9c8cd6ff6c39638e4afdf6f621ab6c
SHA51260986888981404a45c6cdf5a80534a66bfcb20bc1fcbe3673fbef6854cf55af90ddefdcd7c9824d3d3c04d7bfbbfbf0b7b1dd6b440ae3b8c7fe874b06c14b4b8
-
Filesize
6KB
MD5fd1d87e010d8dba6e478f6eb4db373fd
SHA10dbeffa4e5e16dccaf741705a7f189cf588887cd
SHA256d1e4fb62899731b5d26b910e7cf64f07c24df87903e90fb8778cb5837127574e
SHA51268031e5d54e86238afea0d31f53ae25f3877353834de87398dead189ec05f9f6b8d6be888b62dc4adce5db8c417b958711cc254815831caecd9370460c206fc1
-
Filesize
6KB
MD5713508226ae9d438f029a4af59f49cb1
SHA18ff2bac8970ab48d173acc4a8336776d596e749e
SHA256ae705589ec00665d9dba0a712b7e854608109282772b5287df3655bcdf48ddbb
SHA512cf509ea86e8176b181bca3a624ecff03ea2e6ddfbb7ebc06a473209f22297120b941fe9ec353b9667a8952e9602e6a34b059486571c388db3102ec6b7fa35c56
-
Filesize
109KB
MD5b2ae376b380f9fe6ac6d8bb6a5b7f47a
SHA17d1b2b852457405a26e6d643e4a1ebdd934f671f
SHA256524bb7847acb9187ff3908bdd19691e03981ebc1034b200acaef82933175be5d
SHA512c41bab4bd749fc07a0fcf46ff6beb33cf939c27f24d4801c31e407565540dc4d0b754119f851b6225ed45191fda854c921f361d984c6a4fe650cf4bcd967034a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd