Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 18:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://us-api.mimecast.com/branding/secure-portal/NOTIFICATION_LOGO_ID
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://us-api.mimecast.com/branding/secure-portal/NOTIFICATION_LOGO_ID
Resource
win10v2004-20231215-en
General
-
Target
https://us-api.mimecast.com/branding/secure-portal/NOTIFICATION_LOGO_ID
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133499905596410660" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3268 chrome.exe 3268 chrome.exe 4576 chrome.exe 4576 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 972 3268 chrome.exe 86 PID 3268 wrote to memory of 972 3268 chrome.exe 86 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 4132 3268 chrome.exe 88 PID 3268 wrote to memory of 2728 3268 chrome.exe 89 PID 3268 wrote to memory of 2728 3268 chrome.exe 89 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90 PID 3268 wrote to memory of 224 3268 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://us-api.mimecast.com/branding/secure-portal/NOTIFICATION_LOGO_ID1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce2319758,0x7ffce2319768,0x7ffce23197782⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1876,i,1238278357591258732,8393513079327978552,131072 /prefetch:22⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1876,i,1238278357591258732,8393513079327978552,131072 /prefetch:82⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1876,i,1238278357591258732,8393513079327978552,131072 /prefetch:82⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1876,i,1238278357591258732,8393513079327978552,131072 /prefetch:12⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1876,i,1238278357591258732,8393513079327978552,131072 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4488 --field-trial-handle=1876,i,1238278357591258732,8393513079327978552,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1876,i,1238278357591258732,8393513079327978552,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3848 --field-trial-handle=1876,i,1238278357591258732,8393513079327978552,131072 /prefetch:82⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4700 --field-trial-handle=1876,i,1238278357591258732,8393513079327978552,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD586f78a95074e30a82c0f7ed171b695df
SHA1cd6ddc3c8dea4ce3137211d29dca2264af1747ef
SHA256a809e39afe5592f0ffbdc2d0fb9b5662a409bdb8f96654ee1ad8903d9169cd0e
SHA512266e46aa46c643317e4b569a15fea17788bd6a63f3cc359546777be71899901c51b21f3e8df080c442974be17eb41531a5717717e382a17dff53116814d25081
-
Filesize
5KB
MD51f596913b791ee906e25951bcc607d1f
SHA1605dcf3690378045005fd42e3384549f04f04388
SHA2561f8ddb1b9a0231d65dc9167bd5b0c8ad0dfe3dca045c316f75a3c397cc8d02d6
SHA512a6ea256084a7f1eb0c07d2b62f2de76c647e3a620ec741a9cf544d89c12a054277aad4cf12f024afbf0c3a320905fb2cb95bd3e0b54f90a02fa595359810f1f2
-
Filesize
5KB
MD5050ad1ec74a8ffcbacc45ea3980a62dc
SHA1bce7ab6239edb9fb60e236b739560e0d2809101e
SHA256777d8863a43f328263d74a0f68b535a9326e3f09110ce7f0c038783760838fd6
SHA5127778db3f5188214b7598925565a18cfebd74e10ea89d364a59b3e6757069133995f8e18ea3482cb5552306c04deb19a1dd4d30bfbb6daf3b62e6d4a9f05407ad
-
Filesize
114KB
MD520bc0f674f87a0fef21e6769c9a6b476
SHA1ac15630acb8d10116d72e7333c7d702d2159c330
SHA256543036dbbc61cf1725a263e834e5fa2e1ebbdd7ed8c6aa756210721119b92c64
SHA51219be0cf06cf986878262bac4b0ff1e90feaa807718084352d060ebcc1ca4dd61fcaf40581a9fceb18f7b25dd972a3b00433aaa060eec2e5b991a0c325afe63d9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd