Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
601s -
max time network
492s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 10:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://share-eu1.hsforms.com/1ah-TEhqUTvaXgso5qYTuCQ2dokdp
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://share-eu1.hsforms.com/1ah-TEhqUTvaXgso5qYTuCQ2dokdp
Resource
win10v2004-20231215-en
General
-
Target
https://share-eu1.hsforms.com/1ah-TEhqUTvaXgso5qYTuCQ2dokdp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494441167406710" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3732 chrome.exe 3732 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3732 chrome.exe 3732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3732 wrote to memory of 3920 3732 chrome.exe 88 PID 3732 wrote to memory of 3920 3732 chrome.exe 88 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 1112 3732 chrome.exe 93 PID 3732 wrote to memory of 2752 3732 chrome.exe 92 PID 3732 wrote to memory of 2752 3732 chrome.exe 92 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94 PID 3732 wrote to memory of 4556 3732 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://share-eu1.hsforms.com/1ah-TEhqUTvaXgso5qYTuCQ2dokdp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1cff9758,0x7ffe1cff9768,0x7ffe1cff97782⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1880 --field-trial-handle=1952,i,17632817692975646503,5644717433743100998,131072 /prefetch:82⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1952,i,17632817692975646503,5644717433743100998,131072 /prefetch:22⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1952,i,17632817692975646503,5644717433743100998,131072 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1952,i,17632817692975646503,5644717433743100998,131072 /prefetch:12⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1952,i,17632817692975646503,5644717433743100998,131072 /prefetch:12⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4152 --field-trial-handle=1952,i,17632817692975646503,5644717433743100998,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1952,i,17632817692975646503,5644717433743100998,131072 /prefetch:82⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 --field-trial-handle=1952,i,17632817692975646503,5644717433743100998,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD570a10703598c145ac2391c71ed648ad5
SHA124d6888d51f74b421969f9e4ba439e30b8c34183
SHA25608fdddb87dcf24e31167261f3c68ebce6e566faf22a053bfa0cc39cfd21b1c3b
SHA51254123e5f0dc471ded845fc12507a15eef3f5219e542b5d94e86f42d85d11a8f44bcbdf693cc7def979804561f73ec912c855662ac7545e012ca3c8b35919c926
-
Filesize
2KB
MD5d387c72ce1ca463708f43823884d809e
SHA1abcac8ac695a6f9aee17581d66f48c91246d5207
SHA256acb8d16eaa84db5b53114dc9fbad4616553e2bc22ea0def036ba79b2c6d4c49a
SHA5122f013925d34953cefe62fae94f1803df1cd70e9611cfeb70de51e998516a989975531ff272613090345bbfbf5a66c54346ce048363b1d22cbc043165ee996801
-
Filesize
1KB
MD53902051b71e0466b2358b90e324c34d4
SHA12a5acdcd6a3cc16cdc9e1215256484e660d30dd5
SHA256f8aac06cb214e84cb216001e9698b2b9be8ab6be54a500f936d5b0afb6a640fe
SHA512a51a57499fdeefd1e69de38634aff93f2f4cbaac9dc4b4accc4c40655c989a0fecdc74bc647d544ee10dcb9180200944608b15666bd71d6cf22eee1b383deea3
-
Filesize
6KB
MD59753b8525a4c39a45d9a4198375782da
SHA1cec9be473cb9a71c96c68ac89bb1306107a35443
SHA256247e3bb3bc3070c8eed0174e5bceaa972332613af44d120f331863969f5caf6a
SHA5124106eccf29ed7c90835459d57fb7e1575d0f491c052c633b777115a0713e4fc1d876a0427ef6070d2f162b029eb394f0dd3efc7aa3d8559283b307f74d529452
-
Filesize
5KB
MD5b9cb830302c0ea464f632b73b3fd470f
SHA19c05d3597727b39dd91791a74e05b010b4564132
SHA256e2a8c22fb9f26edaf00bea0d3e2bb021f712a16cca82f0a5109418d88bf64913
SHA512939666645b363e5ba7c2ff5ff07f7a637b784f9b8701b66d3690b4b83f288d86313e7f3fb56de03aee7e1e301364a9b67d5b99a31e32426537a2071802d0c23c
-
Filesize
5KB
MD5f127fcf46731d70f3c128bac4d2e77b0
SHA19369a5d97ad6d85965b8bace3c999c8cdd2fe4b0
SHA256a808eb15bc100c2e4756b4188ad64b50390000449254129bc6f3b71e2af23da0
SHA51222bc2a3f63f0c0baead288d5f22e19fd8211b1e9c89824bff0365f8d4101b1552f16e692b243f0161de88089de74b45184f27406c2dd4e580a972390a0a2c6a9
-
Filesize
114KB
MD59ab4398a0e657b832e3e396a3eb92fab
SHA164615aa7f8ac18d394e545864ab8c813d002c8e8
SHA2563eeff91163f5b226f8f148752dde46ce3ac02d0a6668b557c9de23274d5a19ea
SHA51236f5e8d558332d57f4296fe27941219d6cf88c639b4216530d267eeb3db41b16d58a352333b6bb51fddfb512660f694c7520ba14f04cf223f5545fb871cc2d01
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd