Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 03:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://aka.ms/o0ukef
Resource
win7-20231215-en
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133476892603086661" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2856 chrome.exe 2856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2668 2856 chrome.exe 62 PID 2856 wrote to memory of 2668 2856 chrome.exe 62 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 4352 2856 chrome.exe 92 PID 2856 wrote to memory of 732 2856 chrome.exe 90 PID 2856 wrote to memory of 732 2856 chrome.exe 90 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91 PID 2856 wrote to memory of 232 2856 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://aka.ms/o0ukef1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd80989758,0x7ffd80989768,0x7ffd809897782⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1860,i,1889301510232849779,14628493234461093567,131072 /prefetch:82⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1860,i,1889301510232849779,14628493234461093567,131072 /prefetch:82⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1860,i,1889301510232849779,14628493234461093567,131072 /prefetch:22⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1860,i,1889301510232849779,14628493234461093567,131072 /prefetch:12⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1860,i,1889301510232849779,14628493234461093567,131072 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4632 --field-trial-handle=1860,i,1889301510232849779,14628493234461093567,131072 /prefetch:12⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1860,i,1889301510232849779,14628493234461093567,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1860,i,1889301510232849779,14628493234461093567,131072 /prefetch:82⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2632 --field-trial-handle=1860,i,1889301510232849779,14628493234461093567,131072 /prefetch:22⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e0e5de29e4e4f12fa725d82ee228d5ac
SHA160ec4bc8a313b1cbb2965216efd8958415242e7f
SHA25636ac4eeca7db6238fad9586f4359996afb877501d46a1d4065533c41f6f3a308
SHA5129ab1f2771e555feccdba6fd320ea3d14f851441a9fde20e11c1527c04e2a31abcb4c5a62ffac7334ba8f542f6f3758cfde67e7a206ddeb5f83c0c42f3aff5a36
-
Filesize
874B
MD506adaa7f80ef6b68e0f7a6cc276dc63e
SHA151a1f0e9a89934f6b43c6202633cdc6b68b5e8ed
SHA256c7f2855797b28aa2c412799c4122830b499f6c4a5eab744ca9ea838616d64879
SHA5121a82e31e5f297b58fe9582f051165b10bc9bb946b8a556aa8719812500fd16943d7c67a2910d47d0c4549dc38e17b2e687dc3add9390a8c27f00b8b8fbea3392
-
Filesize
6KB
MD55c2d9b9831717458fde8b1da96586309
SHA1118e8be5b150917128bfb09fabd5e70f32d144f4
SHA256b7b16f2a06d6153340d9de4fe18be507f83622d7a402e9fa5c3244ad6fb74f5e
SHA5125d1ab5d8d0c6860c08544a865496c3c8947bf893bd5ddc32592af514e6c09c161468cc8ceea5d83b7506b06fcda3151917710d76a0df151db6a35f28d0f7cd92
-
Filesize
114KB
MD556a073f9b9860a442505b3c74f9684f3
SHA14549dc94dd49fbe85e1b79e6e01b1faecd7f9c33
SHA256c521826f10deb8f4abb43eb6b1674f449cd02931a66922cadb56b0992160f290
SHA512ce7f3b6c91c45580e720bbb5487d8642a2677acbad31bcc7fbcf395267e0cec034403422a0e65aa93dd577e90af6b1824371ac455e68e93ec6b5ef6077b9008b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd