Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
176s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 10:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bofill-my.sharepoint.com/:o:/p/bodoque/EnF6mls_-l5KqkIb0eQGwDMBdeYq_NpykWsLiboUKXgNZA?e=iyxEx7
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://bofill-my.sharepoint.com/:o:/p/bodoque/EnF6mls_-l5KqkIb0eQGwDMBdeYq_NpykWsLiboUKXgNZA?e=iyxEx7
Resource
win10v2004-20231215-en
General
-
Target
https://bofill-my.sharepoint.com/:o:/p/bodoque/EnF6mls_-l5KqkIb0eQGwDMBdeYq_NpykWsLiboUKXgNZA?e=iyxEx7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133486637786433811" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3752 chrome.exe 3752 chrome.exe 548 chrome.exe 548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3752 chrome.exe 3752 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe Token: SeShutdownPrivilege 3752 chrome.exe Token: SeCreatePagefilePrivilege 3752 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe 3752 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3752 wrote to memory of 692 3752 chrome.exe 90 PID 3752 wrote to memory of 692 3752 chrome.exe 90 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 3128 3752 chrome.exe 92 PID 3752 wrote to memory of 1004 3752 chrome.exe 93 PID 3752 wrote to memory of 1004 3752 chrome.exe 93 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94 PID 3752 wrote to memory of 1968 3752 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bofill-my.sharepoint.com/:o:/p/bodoque/EnF6mls_-l5KqkIb0eQGwDMBdeYq_NpykWsLiboUKXgNZA?e=iyxEx71⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa737b9758,0x7ffa737b9768,0x7ffa737b97782⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1680,i,4812290863889195883,14744442234420583067,131072 /prefetch:22⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1680,i,4812290863889195883,14744442234420583067,131072 /prefetch:82⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1680,i,4812290863889195883,14744442234420583067,131072 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1680,i,4812290863889195883,14744442234420583067,131072 /prefetch:12⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1680,i,4812290863889195883,14744442234420583067,131072 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 --field-trial-handle=1680,i,4812290863889195883,14744442234420583067,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1680,i,4812290863889195883,14744442234420583067,131072 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 --field-trial-handle=1680,i,4812290863889195883,14744442234420583067,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5e65bc6ff3db592e1ca5d6ad4b1f2d0a4
SHA1f8e77c9981679d9d1022cfd214c45e595e81d312
SHA256942aa3c22179632a471a230761cf44c6276d2dd1e382300608f85cbe621de1e9
SHA512332f0edeb71ab9f5bb51b745815231f3e1fbbcb5979c482313718ca607e620258d648f19f73fa4af013219eef19a620cac6629e73e541bf27d3c12af7a41095d
-
Filesize
1KB
MD56a8372f80c4a7999930c98bd926a3d9a
SHA10d5c8ea99558a6b5e10ae0c597ed9e5d62134646
SHA2569c8a2ea547882f096f4884b0d3278d8d012da4efc36487257ef7d3b49a662b03
SHA512198ba0e42fa82ae1e9b99b22f4d85912c2544f18521f5c9ba0523d7d7db6111ef2f8af6294c1c9cc2d9f797a9cdba5b760b4415b92dafaa59f041797e087f90e
-
Filesize
704B
MD55b40d07ed529552b6e4f32f31fcb5ae2
SHA1bccf292e629d5c53d99597ea91813eb2bed4111a
SHA2568d1902fcf68e69c8d40f3fcd5851641eb6c7eeaf37a763d1420e1b01139b98ca
SHA512eff07d97a8a1da8124c52783bc17d68aaab2724b5fcd546d963d6b8db21dda443d0f832ac6573baf27964c62532ced9852d85953f645270d21adf6c06a07c8d8
-
Filesize
537B
MD5e334f5393bbf5199e319a7cfb2553d60
SHA12c08cc91c588be63fb68dd1005f3286dea196173
SHA256fb35f8f21a4fe4f35893ddef7dcce9ebf3cc5b4ca796a2514ab9c5ab2aa18511
SHA5127fb9c50b9cd6bbe436b1905df177ab1799682c08cc53c6b0da20ae6ef2928d6f9fd72353f0402b3baae33f8c1b6795b46a64c2b14f916de880a67d9d731e99fc
-
Filesize
5KB
MD53b352c725c7ed8622cead3d0909b3d4c
SHA10fb5b738452686edb2b7a92deae6a845c019edee
SHA2567cfb7fc4209cfd10dbeab91f6ab55c193a5f79b7cf271bfd0513251d97d38070
SHA5120e4acb45faf3b3905c2abeed6e38226054e3304cc454ffd2f8cdf3db957147a96998b10d484acb2536f4ac44a5335c0959d11922505a7afdfdbc7df004a05937
-
Filesize
6KB
MD5197aa0c835c65e901538e5dd8ba2d956
SHA19211107e390daf167842040ee2b300f84673f867
SHA256d6b7543509855914ef5949c169b4f8100a323f21c15f3d752a6f959e05605036
SHA512aab0a83d00acaff93865adef8dc689627407c73dee2f3963444abba273af7d4fe533fad13ee683839a061d2275f308beb8b3f6de2d1bfcbea46be4c4a2fd8376
-
Filesize
5KB
MD54c1d62cfe9d016bbd385da3d49e5a706
SHA1ca4e9001e6ea62828d81ca30a941504ad002ec53
SHA256ba228a50abd36323d96157602a4de394055d8698f924f1fc3948e30ab477f2a7
SHA512e7a67d7d0a7b09a00e83bcb12e9849210598bfd3a7113f145a6479308d860de41d17de448f48acff2c8d15da91a93f59242fe26f5bed4aaaed605689c43978ad
-
Filesize
114KB
MD5a3f1fc914dd484c7a91f5ecc8865a67e
SHA10ec9cc4834d9fcf22cc14b572a1f22cdfe9c8a4f
SHA2566c7c95d1fc33d1d0effce4877c4efb2d10d8ae8f9dafb7611455fe812db35530
SHA51225e976ea4741ba42c7036270384fbaf575db7c5384299d734cafe092731b6f598127b7fc2856861609c667703500d1abf059b7fe1e165eac71156652d51c090a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd