Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
11/12/2023, 15:17
231211-spcytsbfh9 111/12/2023, 15:16
231211-snyh5sbfg9 111/12/2023, 15:12
231211-sljxzaachl 1Analysis
-
max time kernel
113s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
trigger.html
Resource
win10v2004-20231127-en
General
-
Target
trigger.html
-
Size
15KB
-
MD5
c9abab16fcff36d1c6ffa846e19213af
-
SHA1
6d3ab22a1c997c5002756e7a5174b459cb5863fb
-
SHA256
c756569190654cdc9d5742652970bfe2b6e2e8dcdf080349b1ecc741a40c833c
-
SHA512
d3dbd9ada2fbbceb436b267da28a3110648d46ce56a3fa9f976a470bfea8e41c849db2aa41e483b41bb5ca8c757cc1b4f150ead62ebddf3f85a5b1bfa3a3b119
-
SSDEEP
384:T6cNwXEY5p0PqwY+eGNigjHGtec90oi/XhsY8Fhm:T6okEYYY4JrGte+0T/Xhsdo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133467811912770348" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4008 chrome.exe 4008 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4008 chrome.exe 4008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe Token: SeShutdownPrivilege 4008 chrome.exe Token: SeCreatePagefilePrivilege 4008 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe 4008 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4008 wrote to memory of 3388 4008 chrome.exe 31 PID 4008 wrote to memory of 3388 4008 chrome.exe 31 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 4928 4008 chrome.exe 89 PID 4008 wrote to memory of 5052 4008 chrome.exe 94 PID 4008 wrote to memory of 5052 4008 chrome.exe 94 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90 PID 4008 wrote to memory of 656 4008 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\trigger.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff8f8989758,0x7ff8f8989768,0x7ff8f89897782⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:22⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:12⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:12⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:82⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5828f2acb12749971a80f0d4e95fc98aa
SHA19a314f213ba52fb1742aa265dfdac5ba66113dd0
SHA2562233ee818067669a36917926979c8cab62449b28a017f40993458e0f9836d267
SHA5129402a42d3412f770f816e00e5c2d99427282422730bd552d290a47c81584b1d01187e0f50b1585b4fa659801d61b6da52a8c626e667c8e70a7e3d0e71dfb5070
-
Filesize
2KB
MD5fb83d2ac333cd04ab3ca12a00c2fc4af
SHA1b1c644a6a248aa0f1c5b07de8ba7ab2943405237
SHA256db1b4b5791c2403b2fe157d94ac32ea2580ed2dcaced45cd04d11887ea4df986
SHA512aaa0abec3c21c273cbd82392139bb470ff90f820b28baf5ef08b0ed775ea72299ac45b72faed9a0edd7e7bffd6014b4ae8b32441caa337ed4356886e674d2c3a
-
Filesize
539B
MD59ecc604336b834b13108c112adbc1235
SHA10dba9de7fef40d22bb6b52343fb55cb53afc3737
SHA2566b4e030c52f40dd086b7418ce40159db0b776676758a55280fe47ea3b748d92d
SHA512622035ff8f93fd178b533b952436d2eede3a80d3b3c82870e7fd565c195addd9f0527ce8416ce39a668073271497a292b8c2eb0ecd8e74dc40ba8a46238ba74e
-
Filesize
6KB
MD55103a93e831753111c69535c6c846283
SHA1dcb8c8ea4a179fae14bbac30a60d3983b25003f4
SHA256b88fdef8afe0401fcab0ad7b28f8cb2c948eb6a6fe4663aafff9c636ae64a53f
SHA512548dced728f30709009cf2a2c2faf6667fe038ed144ad812569acfa95215b3dd73d9478b850c43bfcb9d4adad47384447f27d392a4b2aa04002deb383be54610
-
Filesize
6KB
MD58dadf2f7880ba08fd0d2d45c877dd557
SHA17eb032e1eb18fb76cb3c7ca4eb8ff7d8991f10a4
SHA256c7727e08304b05f6cac9651374a5ef4a2f3be0784b647b65e3239d726815d645
SHA5128b65e8e8ff790ccfdc084c0c420d9e63dd05168ef26ff9bc4d955b1a21dc17f3516f2f0f120ae149cf2eadb5a82154d3ed4056a601998565a040790ff0e24f68
-
Filesize
115KB
MD5d18e02d3f36c467a78372ee63ee9293c
SHA1450e48b8916a2cfc603c5cb4d871778b0a01753c
SHA25666916d30f3d1e2a896df879131774c07fbd03bbab34fa47163cb1bd2510d2025
SHA512da4a6c273ed8e998e5c797a3ee1b752befecffd0ea31816367f8bc043591a427f5ffd09665f50451bbc6365de973e1f2dfa958ed4e5923e733095356beb6e3e3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd