Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 18:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-us.mimecast.com/s/OjcyCW6zOqfjvA00XHxMueK
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://protect-us.mimecast.com/s/OjcyCW6zOqfjvA00XHxMueK
Resource
win10v2004-20231215-en
General
-
Target
https://protect-us.mimecast.com/s/OjcyCW6zOqfjvA00XHxMueK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133496450939716061" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1724 chrome.exe 1724 chrome.exe 772 chrome.exe 772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1724 chrome.exe 1724 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe Token: SeShutdownPrivilege 1724 chrome.exe Token: SeCreatePagefilePrivilege 1724 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe 1724 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 5008 1724 chrome.exe 62 PID 1724 wrote to memory of 5008 1724 chrome.exe 62 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 2836 1724 chrome.exe 91 PID 1724 wrote to memory of 4960 1724 chrome.exe 92 PID 1724 wrote to memory of 4960 1724 chrome.exe 92 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93 PID 1724 wrote to memory of 5848 1724 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://protect-us.mimecast.com/s/OjcyCW6zOqfjvA00XHxMueK1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7e869758,0x7ffa7e869768,0x7ffa7e8697782⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1888,i,5946553724096426864,2869372902943291814,131072 /prefetch:22⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1888,i,5946553724096426864,2869372902943291814,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1888,i,5946553724096426864,2869372902943291814,131072 /prefetch:82⤵PID:5848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3248 --field-trial-handle=1888,i,5946553724096426864,2869372902943291814,131072 /prefetch:12⤵PID:5576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3224 --field-trial-handle=1888,i,5946553724096426864,2869372902943291814,131072 /prefetch:12⤵PID:5612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1888,i,5946553724096426864,2869372902943291814,131072 /prefetch:82⤵PID:5500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1888,i,5946553724096426864,2869372902943291814,131072 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2752 --field-trial-handle=1888,i,5946553724096426864,2869372902943291814,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672B
MD592029718a34469cf5e74d9be99acbc8d
SHA1cdd923a7bb81dc4e7b8f30abeaddeea909e9de87
SHA256c6e87996f0804d33b41d9b1cd1309e910ffb91cbb3ef940ff0d1a7b807ca206e
SHA512935254ff0dfab1277cc6823acdf8fa2ed5bf130f1ec5ef0af254a76503c040fc130380e78efc43335549a8160d36e6486d5e95a628ab6253ffc3c9da8a0a85ce
-
Filesize
2KB
MD5a5bd3682f3a93101b6d54535ecff06a7
SHA117932a399bebd73f0b536648d8cec28ed77b128e
SHA25615306adb895d4f5fff566b27d081438f1649fff324bb8b1987e52ad9db9d7cbc
SHA512fb9edcc239da3e2915fd47f265f2fa8025c9329b293e3ab0f4fa63e469f6fd7ae2af29c423c28e2b0d400e1ebe7dd251c0fb98f0de66a150f89771df66223faa
-
Filesize
1KB
MD5abd242a0c03bb1ee109694d30d0bc001
SHA10bb6394a339e1834eec446cd7bce6c8a05734e8d
SHA256c01fd4c8fba6891f4a4920ff8ea37d56c37116f52fc688fab07f0e96c2f1254f
SHA512a9255985fd11bf66b2d6e768aa380bf6d414a5cce4bcda2c7cc9271b7d322a5bd522d998a8fb6d83598585b138f28e4a0e385acf430c8aeb96f1416284b62b89
-
Filesize
6KB
MD541ea2d70ec9cef1270af8cdef29bf24c
SHA10c75502863fd4f7e4e3f5b66a61c82c47b73e122
SHA2562fa571313dbec7b5dbf9bca8828fc7d9e6b74637a3099207d880f58596d18424
SHA512d23629eb903982941d1037eec080fbdefa0dc4353d95c06f02a0a3d063366d6f7bc41f95d75615f147292c6db6635855b664686871a95ec2d27fb263958c2c25
-
Filesize
114KB
MD5b1dfaf5635f35845812e6cfabdaa9992
SHA102dc2fa0d1c414c14f277481e2aed7abaaa6ddda
SHA25623e7d80f1794f0d865cef345b5233e2908149f8aab380940b0937b2ef1a1cd19
SHA512269b6892964e3e22667161666266fe616dc0280b0ff61b724718e3b3876e7499cc0f7d2f4dc4db5ed113697941b03b0a11b43fa1a606a57a7d2297b591d83e4c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd