Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
290s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/01/2024, 01:28
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001MXFBuQNJMiripjpViAa_BglRYwM-nVyUjPEhFEFpORGBX_BCcOzZ8Tmo1k55cEzvCHy6dMw_hXq0j30eoL7thyMwaWTa0GW1eJiq_vpDn2dwdSNAzgThzQD6PIjVd6Lq1kSK0bZI0ttO4JZdzP7MGvhF2zIg1314or6Hml0Tohq_lwOjCFwo4g==&c=4ry94kPSKqTta0a3AERm4gWZnc0LtT6686idwHezsV2q44iRJyo3hw==&ch=018MNFoWL3OtVmKqcXkvVciVtDyyRfrhgcMu8BkoOPiLbStR0ZgJhw===&__=am9obi5tYWxsb3lAb3BlbmxpbmsuY29t
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
https://r20.rs6.net/tn.jsp?f=001MXFBuQNJMiripjpViAa_BglRYwM-nVyUjPEhFEFpORGBX_BCcOzZ8Tmo1k55cEzvCHy6dMw_hXq0j30eoL7thyMwaWTa0GW1eJiq_vpDn2dwdSNAzgThzQD6PIjVd6Lq1kSK0bZI0ttO4JZdzP7MGvhF2zIg1314or6Hml0Tohq_lwOjCFwo4g==&c=4ry94kPSKqTta0a3AERm4gWZnc0LtT6686idwHezsV2q44iRJyo3hw==&ch=018MNFoWL3OtVmKqcXkvVciVtDyyRfrhgcMu8BkoOPiLbStR0ZgJhw===&__=am9obi5tYWxsb3lAb3BlbmxpbmsuY29t
Resource
win11-20231215-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001MXFBuQNJMiripjpViAa_BglRYwM-nVyUjPEhFEFpORGBX_BCcOzZ8Tmo1k55cEzvCHy6dMw_hXq0j30eoL7thyMwaWTa0GW1eJiq_vpDn2dwdSNAzgThzQD6PIjVd6Lq1kSK0bZI0ttO4JZdzP7MGvhF2zIg1314or6Hml0Tohq_lwOjCFwo4g==&c=4ry94kPSKqTta0a3AERm4gWZnc0LtT6686idwHezsV2q44iRJyo3hw==&ch=018MNFoWL3OtVmKqcXkvVciVtDyyRfrhgcMu8BkoOPiLbStR0ZgJhw===&__=am9obi5tYWxsb3lAb3BlbmxpbmsuY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133497557239779230" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1020 chrome.exe 1020 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1020 chrome.exe 1020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 2116 1020 chrome.exe 79 PID 1020 wrote to memory of 2116 1020 chrome.exe 79 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 396 1020 chrome.exe 81 PID 1020 wrote to memory of 1644 1020 chrome.exe 82 PID 1020 wrote to memory of 1644 1020 chrome.exe 82 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83 PID 1020 wrote to memory of 5052 1020 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001MXFBuQNJMiripjpViAa_BglRYwM-nVyUjPEhFEFpORGBX_BCcOzZ8Tmo1k55cEzvCHy6dMw_hXq0j30eoL7thyMwaWTa0GW1eJiq_vpDn2dwdSNAzgThzQD6PIjVd6Lq1kSK0bZI0ttO4JZdzP7MGvhF2zIg1314or6Hml0Tohq_lwOjCFwo4g==&c=4ry94kPSKqTta0a3AERm4gWZnc0LtT6686idwHezsV2q44iRJyo3hw==&ch=018MNFoWL3OtVmKqcXkvVciVtDyyRfrhgcMu8BkoOPiLbStR0ZgJhw===&__=am9obi5tYWxsb3lAb3BlbmxpbmsuY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcbfc19758,0x7ffcbfc19768,0x7ffcbfc197782⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1824,i,14528499249760710048,7364937660570325260,131072 /prefetch:22⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1824,i,14528499249760710048,7364937660570325260,131072 /prefetch:82⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 --field-trial-handle=1824,i,14528499249760710048,7364937660570325260,131072 /prefetch:82⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1824,i,14528499249760710048,7364937660570325260,131072 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1824,i,14528499249760710048,7364937660570325260,131072 /prefetch:12⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1824,i,14528499249760710048,7364937660570325260,131072 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1824,i,14528499249760710048,7364937660570325260,131072 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=824 --field-trial-handle=1824,i,14528499249760710048,7364937660570325260,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\093aaeed-c964-4755-90c5-0d95e18b6adc.tmp
Filesize6KB
MD50d4bd67ffbc6f95be28ad440fda3f076
SHA12a10ef8158a0bc478e48ba7493127721fd39f3d5
SHA2564b8592e22d32039d2a25bf40d8430b5eca8095375da5957531527fa1df681923
SHA512e47f1f36863515bfce65bd34953c1091cd4d014e7e0f1896e1f862da1f30dd4bd7fc488f83ac5d29ffe10c61fd6b6ba991a1157a3e647901c9fb1ae591456e40
-
Filesize
72B
MD5da699ede961b4eb1d30e3131f94d1b8a
SHA1b7e541548597a9a44e28f4fbefe4664ac40652b0
SHA2562d9da52fbc12aa2e7d385ee4dea903fb66d422f2d3093cdb69ce787c9205a55a
SHA512105b20006a3dc94e32b0aef5f788df20879a2790523a8b96d1a922af5de0c54b82fb6b228c238100c640cd0daa1ff182e8adc733c50a2c3604516e6bcc37348f
-
Filesize
1KB
MD527de2de38aa7120863943eee4125bc7b
SHA15234e44545178abcb60ee61914064989865c3011
SHA2563f25b45e2270a753fc88b872bc98a1d908f8a3ffffe6f45335f5971955c5ba32
SHA512e48d8bef0d1fd6de7ab34b25d4953bb596e2e0f334f9574664946014c656ccd8f35f6646887e3e69f0d9822a1e0d1778d605818e2c973ed85e132bbaabe5d0ef
-
Filesize
707B
MD5e4090619031c1def9eee1c5b93dff5b7
SHA177f8b530f81b507b0de9d13f8c2250cd062426b6
SHA256151ac305b1f570ac15780249eee0263aea45181a8f63d3fbef60ef9de95651b0
SHA512644ce0e95646828452e8ac45866ee1d872c17e4bb393f742d0c51c3d82d9f7609e036684b7fed3e875e6abc94bbc133ee2f1e09ef85891a44d99632367a096e1
-
Filesize
114KB
MD5c264fe19590adeed28dd2945f543f6dc
SHA161ddfe35dcdc7fb9f8514a43bbe33d00b0df460d
SHA256326cc08873c2b8b3c780c0eb909b29032717599e6e4f0d8969e9e25a8b07ef08
SHA51292f10b01d8786ce841925373bf0ca7ffde63afd5ea5ba502c1fb37d9ec960518fb6ef94e054a022db4c4b9a4650fd8a10b05940c7763244088f4302a6374b81f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd