Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
167s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 18:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://psata54a.quickconnect.to/mo/sharing/FY55lrW03
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://psata54a.quickconnect.to/mo/sharing/FY55lrW03
Resource
win10v2004-20231215-en
General
-
Target
https://psata54a.quickconnect.to/mo/sharing/FY55lrW03
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133486078958613327" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3396 chrome.exe 3396 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3396 chrome.exe 3396 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3396 wrote to memory of 788 3396 chrome.exe 90 PID 3396 wrote to memory of 788 3396 chrome.exe 90 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 1948 3396 chrome.exe 92 PID 3396 wrote to memory of 5056 3396 chrome.exe 93 PID 3396 wrote to memory of 5056 3396 chrome.exe 93 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94 PID 3396 wrote to memory of 3824 3396 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://psata54a.quickconnect.to/mo/sharing/FY55lrW031⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9987e9758,0x7ff9987e9768,0x7ff9987e97782⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1964,i,8993703985876060277,15582041996626819116,131072 /prefetch:22⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1964,i,8993703985876060277,15582041996626819116,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1964,i,8993703985876060277,15582041996626819116,131072 /prefetch:82⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1964,i,8993703985876060277,15582041996626819116,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1964,i,8993703985876060277,15582041996626819116,131072 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1964,i,8993703985876060277,15582041996626819116,131072 /prefetch:82⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1964,i,8993703985876060277,15582041996626819116,131072 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 --field-trial-handle=1964,i,8993703985876060277,15582041996626819116,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD59fb1ee89ca84c806a2b41c9fbbb5172c
SHA18a7309bcbf9afea3e0694d579c6f87a5c6357bc8
SHA25618494f8be62b389a99b370122a81fb1e4ae564365d5f1eef9183bb2c68e131ad
SHA5125733157cb3edc3d003fd55099b58bcf083a0e0b0dc737b96975b8d7f417027f9b7489df2d3d99a65037cef262c6c5ec67b189165a0c35551a2968249a187a848
-
Filesize
288B
MD595a006208842ff4f920123b0d6e0c261
SHA1434a373a7cc6646ebb38bd620a20ca62345e4f2f
SHA256f2e6f012f9188ea5c38581661fba0921fd8312d1df91cbf82b72e0824a0b98b1
SHA512baad14fa77ed3fb2783bfb50075b08f7d8645765ef9304bd7d8d7d4e6d128d528e55374559df29372068193e416b0fecc84d835b70c065ca0bbf99d63e4d7e51
-
Filesize
1KB
MD57fda151ab95270a7a477e26964b2156e
SHA19a5329c832b6377d6fc390ef5bb7b505808170d5
SHA256207b740e1fe01e9f13a246bcb3d5a7cc1e9cbfe53d9913e2c9be259f94e34368
SHA512cb5bdf292d049aad9bbe12843bb8825da651d5e2903582305757f90ba1a4a18c4264ba4e726e6d27ffd516f7df3ac8fb8bd5104ab8aa62103b48100b7d5023b2
-
Filesize
534B
MD5af0883aab3e2fa0e388acd671d3c9500
SHA135201058cb45deea949a7d132862757db3d86708
SHA256fdf6559bb3b9fdb644e85baf1b60718564756ba0acbc9713b3a154ea40f70d4e
SHA5126f4fc78af53b4f25e1f85bff873f77627482dc44043044867b5b3b78040dbae0e2ef9142c1ed9a6457376c44025c2e89271c180cec9837c613281c4e61df1116
-
Filesize
5KB
MD5ff5581ea988d3a7a47a37c1ceb0ba395
SHA163bb9034203e3aace1adbdae6ef5914478f2de30
SHA25640ec16faac9f1d0284f8c366c82a33103b43641c70ae377987edc7a51c6915ea
SHA51236c95d6590fd0f84cabee95bf90ab80a25f53a747aeef9cfee70a70ef39faedb2b6bb3e28bf91400db8b946dc2351bf42508d3a3acacac83f64a43b19cfb30d3
-
Filesize
6KB
MD58325f3364f06ae70080404d3bbe04494
SHA1a1c2208b96985a03cbebfa36487d43b997110430
SHA256441e524ca23281d8da90a80f0f590434f0628ba6c5b69c84a64417470954fc2f
SHA5129426473e5e670d7eb6389670368056501023e46099f00ee5f76c1aa2177181a7ad14f146b451d19d4e8f8604df09c3f95f95dd9cc407980dd0371b522676bf6f
-
Filesize
5KB
MD50186ae536153735b06c6127c3aad963f
SHA1b8fa07a329b2a544acb381d7a0eb204a3d2e2231
SHA256a0edf2f83d23ff505ea5beba196fa65d4fa07356bf8fb8db8be64b48e88efe71
SHA512dffee1a85fa96f493b8efbf3c1b6430f41c646f22beaf6dee9dc43dcbdd600dd9f33dec0a1c4badb43fae71733195e4b26ed3b1034346e09b733ca092ba625a5
-
Filesize
114KB
MD5293070c47153f2f909a956278e17ed8f
SHA1e6739f262a0fd09291520e4fb70012bcb610b57d
SHA2562f1c7e7b302999e6a9cb441384000e9adce94aed2f5de297f17eac7fa54322e6
SHA512ad10134108e069e4e13975128aaacade6de154cbbddeb073d2d1364b3ae5abc03a8bc98ff54654d6608973897dea6dcbcd03963f7d476b326590674e6d25358b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd