Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 20:41
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001WsNz8WS1Iq1EYXsq36yU490VaY4KRvT8yQ5MM2ZOnZD75syT28cj1s--uNXfq1t2uqJd_AmcLUNJRdMaD3KKFLf4mFJsCpgWlrR8VRYLHGEBgD_tDNZO_n3_F5obXfyEtYRbmis7JYM==&c=&__=dGkub2NpcEB0cmFkZXNtZW5pbnRlcm5hdGlvbmFsLmNvbQ==
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://r20.rs6.net/tn.jsp?f=001WsNz8WS1Iq1EYXsq36yU490VaY4KRvT8yQ5MM2ZOnZD75syT28cj1s--uNXfq1t2uqJd_AmcLUNJRdMaD3KKFLf4mFJsCpgWlrR8VRYLHGEBgD_tDNZO_n3_F5obXfyEtYRbmis7JYM==&c=&__=dGkub2NpcEB0cmFkZXNtZW5pbnRlcm5hdGlvbmFsLmNvbQ==
Resource
win10v2004-20231222-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001WsNz8WS1Iq1EYXsq36yU490VaY4KRvT8yQ5MM2ZOnZD75syT28cj1s--uNXfq1t2uqJd_AmcLUNJRdMaD3KKFLf4mFJsCpgWlrR8VRYLHGEBgD_tDNZO_n3_F5obXfyEtYRbmis7JYM==&c=&__=dGkub2NpcEB0cmFkZXNtZW5pbnRlcm5hdGlvbmFsLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133489609070800037" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1800 chrome.exe 1800 chrome.exe 4412 chrome.exe 4412 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe Token: SeShutdownPrivilege 1800 chrome.exe Token: SeCreatePagefilePrivilege 1800 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe 1800 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2880 1800 chrome.exe 42 PID 1800 wrote to memory of 2880 1800 chrome.exe 42 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3176 1800 chrome.exe 90 PID 1800 wrote to memory of 3308 1800 chrome.exe 91 PID 1800 wrote to memory of 3308 1800 chrome.exe 91 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92 PID 1800 wrote to memory of 1072 1800 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001WsNz8WS1Iq1EYXsq36yU490VaY4KRvT8yQ5MM2ZOnZD75syT28cj1s--uNXfq1t2uqJd_AmcLUNJRdMaD3KKFLf4mFJsCpgWlrR8VRYLHGEBgD_tDNZO_n3_F5obXfyEtYRbmis7JYM==&c=&__=dGkub2NpcEB0cmFkZXNtZW5pbnRlcm5hdGlvbmFsLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94c5f9758,0x7ff94c5f9768,0x7ff94c5f97782⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:22⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:82⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:82⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:12⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4892 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:12⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3960 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5032 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:12⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:82⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:82⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4032 --field-trial-handle=1860,i,15621563548008515367,4449327545275286472,131072 /prefetch:12⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD548f1674cdf530624146e0fb4fe8b397d
SHA11515a6b7094b81de2203255993be31da21a8e1ed
SHA25669b199ebaf8a40e2f1dc521595191ecaede34eae2c1481c0d4ff82647920e70b
SHA512b86358daebae6e9277c00c09ada94fcd94464f682a21242e89377614d2ed40b0e7735618176faa1d43adadff40d93ef5ffaef8e23ae1c30164b4f74bfe694abd
-
Filesize
2KB
MD582f1cbb1cb473969d4f9e6a90955784b
SHA14bec56e3f4ce2f4f44ac0d90239f4717e63094f5
SHA2567230df84c171531986566a24b3311316f52d2233dc68c833d3fe5b656d48e5af
SHA512728d9412a4d9881c6967b762dafe03311960ace496c3b618a46390f9780f1b9d52213945e8d14e9702df0601e80d8bfaa45b1db376b96982be2176b52c1a59fc
-
Filesize
6KB
MD5a61bf07673d437b5bc81638dd1d14a6c
SHA1944390296f0034722d3a573ee7f311225b60d1c0
SHA25646c7ab791fddb2c18546b3b27a86d6d1dd189f60ef7a5cf8e3db0f6eeb9ccf6e
SHA512f5be5f66f374784b21a0002086afeadc2a1ff8ce7efdc56d6479825899ae3fde9bca0853f097f989bb1e578e217199f9b209ec8b2bc7d62b4665460e71b4b585
-
Filesize
114KB
MD57ec6ab52e3efb0bd315ead74accda694
SHA1d58ddac916db05ae76581a030a2590b22b6fad2f
SHA256df5be5bb05076f1cb0c7536f5de73d1f2c4b7655879c5a53a17b471ad5312969
SHA5123072d786f0c13bd9df6904aa76839f6b1d9d053b61c1670533d247d9a4a52641c33a0009f12c2e25e0eda208bbf14a99aa6fbdf86498142dd258c64e7f0f7556
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd