Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 18:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/error.jsp?e=7kfjoxgbb
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://r20.rs6.net/error.jsp?e=7kfjoxgbb
Resource
win10v2004-20231222-en
General
-
Target
https://r20.rs6.net/error.jsp?e=7kfjoxgbb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500755956381442" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 2284 chrome.exe 2284 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 3504 4832 chrome.exe 39 PID 4832 wrote to memory of 3504 4832 chrome.exe 39 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5584 4832 chrome.exe 95 PID 4832 wrote to memory of 5672 4832 chrome.exe 92 PID 4832 wrote to memory of 5672 4832 chrome.exe 92 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91 PID 4832 wrote to memory of 1572 4832 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/error.jsp?e=7kfjoxgbb1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8dac9758,0x7ffe8dac9768,0x7ffe8dac97782⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=2016,i,6711323726866940476,4926509778584367559,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=2016,i,6711323726866940476,4926509778584367559,131072 /prefetch:82⤵PID:5672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=2016,i,6711323726866940476,4926509778584367559,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=2016,i,6711323726866940476,4926509778584367559,131072 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=2016,i,6711323726866940476,4926509778584367559,131072 /prefetch:22⤵PID:5584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=2016,i,6711323726866940476,4926509778584367559,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=2016,i,6711323726866940476,4926509778584367559,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2564 --field-trial-handle=2016,i,6711323726866940476,4926509778584367559,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2528
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5512
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:6012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD52bc11a85c5b41fb11830ce358a586397
SHA1270b3e9e02c13169c63764ccf4c0bce9aeae4056
SHA2560dbae4a27abe793277b6d3c28684022e1b6baff4773659c261da3317dfa8e899
SHA51284ababb59f0ca15d0e742bf6fb88422bacc8732fe4364fc51a4a8a4837b808aeef2c532beadf38942b310cf9a288fdd2237f2197ef548f3e4409e29c6f23029a
-
Filesize
1KB
MD5ebc81bbb6121ef0b871ba5e051fb7c3a
SHA13bfcf918df081a1fdbf2ebcb54195cddb05fe831
SHA2566b5d66f6ff35649113f0deafc89944a608f1941755c979156916bca789731eb8
SHA512b93a63a9a6f6545f44ec521a294f9c2a09c15aabefcf75e7f01e96581bc799a33e4b82e52b581a10f7bf29b9140956929ed9bcdfd4c65929495cb8d4c40cf48c
-
Filesize
707B
MD574f23ecdd779665ddf801037a1870a4d
SHA1651586a3d4ddc535b63c3e6e8cf65e05d7f48ec4
SHA2560707d497d49c59f64af41cb861eaab60e1ab7f244d083c3f26542a9d943ecf00
SHA512943b08ef1b3d7e96003ce8ca47317eb50c927215ff3d58ac089835ae2e8e380ad042263151db5d6fac7add1f868315ad96fcd38e60c5ebe8fc17a7546705ccd9
-
Filesize
6KB
MD5dddd840a185cfd7a20c1d15e7aac620c
SHA19e424068a30f05cf9d2dd3c198b0b67892b33ce0
SHA2563ba020f30993697dc04dfb481dbc0df39667ba507ae29623763fc22f20665a6b
SHA5126c2bc8bdf57a28c984fd175e16d2f93c62a1c669e2a85b925f576ebcc0af9a8105e23d453f6b7173cd7af4fed8f9a62e7e294c5e7e54752ea8af8ddd57180cb5
-
Filesize
114KB
MD5376b5a6cdaf7e2511eb7c87d52f8736d
SHA1a387329cc79939930910b699fddcf7281bd73f37
SHA256c7d48df90d94842fe0020fa712c659f214d3494eff321629581cb34f4ac1a001
SHA512b60a225dd139fcfff49999508f6def9291ad718aafb15ea81eb1642d8b3cdc64d521b40db832087e3e47311a5654c863806316905828c79849b95f8e8a39e5b2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd