Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 21:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudflare-ipfs.com/ipfs/QmcjEbbr1GrD3XcxBP5ALeS96HscWu19Bou9a7tTaLcaJM
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://cloudflare-ipfs.com/ipfs/QmcjEbbr1GrD3XcxBP5ALeS96HscWu19Bou9a7tTaLcaJM
Resource
win10v2004-20231215-en
General
-
Target
https://cloudflare-ipfs.com/ipfs/QmcjEbbr1GrD3XcxBP5ALeS96HscWu19Bou9a7tTaLcaJM
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133493106414905811" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1196 chrome.exe 1196 chrome.exe 4372 chrome.exe 4372 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1196 chrome.exe 1196 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe Token: SeShutdownPrivilege 1196 chrome.exe Token: SeCreatePagefilePrivilege 1196 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe 1196 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 4956 1196 chrome.exe 65 PID 1196 wrote to memory of 4956 1196 chrome.exe 65 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 2584 1196 chrome.exe 91 PID 1196 wrote to memory of 4088 1196 chrome.exe 92 PID 1196 wrote to memory of 4088 1196 chrome.exe 92 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93 PID 1196 wrote to memory of 2924 1196 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudflare-ipfs.com/ipfs/QmcjEbbr1GrD3XcxBP5ALeS96HscWu19Bou9a7tTaLcaJM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd98ac9758,0x7ffd98ac9768,0x7ffd98ac97782⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1884,i,8490427212872209666,14996326767266275710,131072 /prefetch:22⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1884,i,8490427212872209666,14996326767266275710,131072 /prefetch:82⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1884,i,8490427212872209666,14996326767266275710,131072 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1884,i,8490427212872209666,14996326767266275710,131072 /prefetch:12⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1884,i,8490427212872209666,14996326767266275710,131072 /prefetch:12⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1884,i,8490427212872209666,14996326767266275710,131072 /prefetch:82⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1884,i,8490427212872209666,14996326767266275710,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3808 --field-trial-handle=1884,i,8490427212872209666,14996326767266275710,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5c85986a32252b5792ff145faaa52600e
SHA1284dfba344911ed40f72907751e13a0a73853491
SHA2563eac114653ed3412c84a8a28ad8ff86b72c7a5e22a2ee89f8ec2d729625f0ae0
SHA512e59491bd97d319265c5f5a70e57b8c89b846c373caed7699509d5e9f443882d5e1982b172bae4ee5a5d6d30d08519aad4b01edacfa60a6537b40e11a44866590
-
Filesize
2KB
MD5107835ac37772535a6473e655cbe76a9
SHA174e6d7d7c5a948e0c67beca2bdba7fd2e7d6c00a
SHA2566b956e409772d4ceb8efd3df613212ed0429373c73b1bb11f294afac527692a6
SHA512d339caf03ea796f9ceee030904d96d4bc9fd5e8450a50899c46aaf711b1545544e7e87c64c643bec51213a6b1b49f295dd5d7ac000cd6f73fbf48431a9496e7f
-
Filesize
1KB
MD5025be2169a73c02d22ab22247f9e2917
SHA157f1509587142b9bd60e69331cacc5dd30e3975b
SHA25683fb0b0c671a6eab9b8f21a1317954e4869ca6a8d12c75a3468c43d15cd76eec
SHA512724bd3bd85f9e445186d1d3585b35115d6d46e08ca6073b0b89997ad3dae9cd02a86596d982801e758c0630315048565a6b83a86ff6f56f6859254666487cc8e
-
Filesize
6KB
MD5a0b3de5247fed999d60c733dcffacfdc
SHA1942f05d96dbb91a68257b3f1ac48b31dc2b7565d
SHA256ca91bcdeb542c7f24e6b3b5b7482415bd1ab4e700692fa2696cc6d8074b2fa73
SHA512fbdf717ce9da7abb8bcca9daaaafb0f0af60e9c93c4f819b046fe99cbf8020e0d266a373f73bd5131547ec9e20cd4e80b4298877aa3efa09e2cd096cfd6266fd
-
Filesize
114KB
MD5450d1f0a90b19be48fdf37fa6ed39f10
SHA136ca6a254bddf77be7135794a9a3d85f2bbf94ef
SHA2562284c176ed7d5d5357e5e89bd835234dda64ea664ddeeb6d23ee345a1b1da8a4
SHA512e7a80739ec4951bd08d451fb6184cb9a52333fdab7db8e91b3024eaee9b856175a72c058173cda4234433776068df241454f0a6738b1af2590a42366a7d1496c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd