Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
271s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2023, 15:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://imperial-international.com
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://imperial-international.com
Resource
win10v2004-20231127-en
General
-
Target
http://imperial-international.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133468684899198485" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 5072 chrome.exe 5072 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe Token: SeShutdownPrivilege 1644 chrome.exe Token: SeCreatePagefilePrivilege 1644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4200 1644 chrome.exe 86 PID 1644 wrote to memory of 4200 1644 chrome.exe 86 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 3860 1644 chrome.exe 88 PID 1644 wrote to memory of 4136 1644 chrome.exe 90 PID 1644 wrote to memory of 4136 1644 chrome.exe 90 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89 PID 1644 wrote to memory of 2044 1644 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://imperial-international.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4c459758,0x7ffb4c459768,0x7ffb4c4597782⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:22⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:82⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:12⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:12⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:82⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4916 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3104 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:12⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3776 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:12⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2764 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:12⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3728 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1760 --field-trial-handle=1840,i,18006889617200368816,4889551356272551587,131072 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD50b20e39429d7a6ffe088b3013bdd2e17
SHA157b62ef0a10a4b6b00bacdd3ea64c1e615c197ae
SHA256892be9fe2c5c457e132695f3d7c0c00af3583fc94c9ea62fe69c7c660f612a85
SHA5125e9387e32e54afc4531a7fcd325d5c06e8554adae83d35273cdaa4cb83d3ea008572f7ad17379c9a182d9f86ec115ca99e351c7646578047a21e48dc42ca4032
-
Filesize
6KB
MD5a0fcbb427ac36a96b88c495ef72e4080
SHA1c379599690b7a141bb057af114e8fa3cb801173e
SHA256dfd23902cc19ed199e528104bdb7ab64284b1e4c69216243aaa44c0b09379051
SHA512021176b8e4f9affa1dfd6093be3869aa58a179d972d5bd0fc549adf0519358823f63d024b432fb47829c094287c8e3b831f7ac1e9ee622a340896a426346aeb2
-
Filesize
115KB
MD5c90033980ab6802d89be54f407fbc007
SHA1681ad7a6a4049b0a1a18e530ee3851ca05f12cfa
SHA2565d7934139a16b74d0226db331d17526d59c09a187199373343f7e13551ad2023
SHA512b6221b9de1c38a02dc2705ed66fd4a9361f801f4d5eead1bb40ddccc869336e33815527f51510c9a94d8736c82aa2b63d761b923cef00b12588ffe1b02c70d43
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd