Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
602s -
max time network
605s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 10:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://share-eu1.hsforms.com/1ah-TEhqUTvaXgso5qYTuCQ2dokdp
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://share-eu1.hsforms.com/1ah-TEhqUTvaXgso5qYTuCQ2dokdp
Resource
win10v2004-20231215-en
General
-
Target
https://share-eu1.hsforms.com/1ah-TEhqUTvaXgso5qYTuCQ2dokdp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494435620540921" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe 4416 chrome.exe 4416 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1036 wrote to memory of 1180 1036 chrome.exe 29 PID 1036 wrote to memory of 1180 1036 chrome.exe 29 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 2440 1036 chrome.exe 90 PID 1036 wrote to memory of 4032 1036 chrome.exe 91 PID 1036 wrote to memory of 4032 1036 chrome.exe 91 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92 PID 1036 wrote to memory of 5084 1036 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://share-eu1.hsforms.com/1ah-TEhqUTvaXgso5qYTuCQ2dokdp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff958ad9758,0x7ff958ad9768,0x7ff958ad97782⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1880,i,5786033834872652051,13805524579240996680,131072 /prefetch:22⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1880,i,5786033834872652051,13805524579240996680,131072 /prefetch:82⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1880,i,5786033834872652051,13805524579240996680,131072 /prefetch:82⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3220 --field-trial-handle=1880,i,5786033834872652051,13805524579240996680,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1880,i,5786033834872652051,13805524579240996680,131072 /prefetch:12⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3880 --field-trial-handle=1880,i,5786033834872652051,13805524579240996680,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1880,i,5786033834872652051,13805524579240996680,131072 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4408 --field-trial-handle=1880,i,5786033834872652051,13805524579240996680,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4768
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3292
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD554b806f7e0cd27f012010a40d90e9c2c
SHA1868e169b75fdd5cf84d398158f9b36fbbe203e7a
SHA25689ff21140295e9a46e030e59dd2df568a18c8f6d19de4ccc39973ecc61f6ff97
SHA5124fbbd6db9b1e7fe5527a79a0cd6b0e7956458d52fd845aadb68df2810f7660c9b1cb6ddfe52de9af9ce3d1c1f7549bb792932cc9dcaf93a9dfce46841b8a5efa
-
Filesize
192B
MD53303b103d2adb409bfd9d438e8d71c96
SHA1365afa5d3bfad226aaa07b6c2decceae98c28b6b
SHA25688cea15094ba1ff8aa7f0e431b817cb32975d97104238953795176c0adc07826
SHA512a6abf28b211720432941e6c08ebda71e2cc1bbc89638486b0905021bf611e644e860cdfd6922b59c057b94f85a7e0ca66bca8cd5b7894b44c80003065c92cef9
-
Filesize
2KB
MD539bb7ff8e3c59b332245d06296b8167d
SHA19e18ab2bd8efc6e624a50f38fee5b76e17a5d937
SHA256a51e6c556981789271b0db8bea07f36ae12c2ad0817f902efc1d55b3b9b5a63b
SHA512950edb1f741356a75e9f01d4c408043e656a73f3161cf1f5d5ec21508d000d8443fc1bfc902ef130e45c37320dc23be2a110a198e30f66c1da8fdecb217adb5c
-
Filesize
1KB
MD5be307538c4fd4249fead80754af9cf1d
SHA19defcb6b508f2e98a4deb573bf4a8bbec6ef60f6
SHA256ecd60c15608c9efb85e45c37c45f326dae5c04fa67b224a42dff14fb81e090f7
SHA512a49eb609d0d7b58bd9ae77b03184e38e0d338e751a64fb17a10808e14194e87b8ee28e135861a3931d6d6056b237b4b80d3a2518213323de90bd7563ad24b535
-
Filesize
6KB
MD559f161d467bad66fe226eda3de98c9a9
SHA15ea5f0bfdc9280b1c3ada06673e0cdfd606d8269
SHA25688fa67711df6139b014c4e6fa9b027b5eeedea6945ef1c0a23ff92459256cf69
SHA51258c614cda673ae36e41e71da34f82a1ce89351094d8ab056eee0953a3598b4c24dacf529032ce1086ec2c3adf5c235796e838f43a911f07213518c6b7fbf15a2
-
Filesize
114KB
MD52b0d07f84a09f27f57a83047201891c5
SHA1d2339c4e7b37526d59c180ba92fd1d80f437eb05
SHA256dd46c2324cef8d14d535f062d49668a05a92ddbb8508e95962dbbb4d950bbc27
SHA51284359c5ca47d9700a0cf843a5566d60830c37b66d4054f23c18683b3d727e7d3d0849baacf96fd280bfc94d6365b95c726665d5ace3656c82b2fc9dde3d44661
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd