Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 16:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.ecv.microsoft.com/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://www.ecv.microsoft.com/
Resource
win10v2004-20231215-en
General
-
Target
http://www.ecv.microsoft.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504158652364549" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2580 chrome.exe 2580 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2956 2580 chrome.exe 85 PID 2580 wrote to memory of 2956 2580 chrome.exe 85 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 420 2580 chrome.exe 89 PID 2580 wrote to memory of 352 2580 chrome.exe 90 PID 2580 wrote to memory of 352 2580 chrome.exe 90 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91 PID 2580 wrote to memory of 4088 2580 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.ecv.microsoft.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeccb99758,0x7ffeccb99768,0x7ffeccb997782⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:22⤵PID:420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:82⤵PID:352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:82⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3684 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:12⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4056 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:82⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3892 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3812 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1800 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3852 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:12⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3784 --field-trial-handle=1832,i,10216499788336535965,13776068493999886713,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD55a9b74a7c485b2c1271ccca63098f1c9
SHA152e750b2f940d877306a24cd9c3b3c6a721b4876
SHA256e598e5d5dfd7878da0f996826074ff9406c29cab53c869ddd186c7f90ff86bc2
SHA51266eb2cc704c458418282da8fc230a3bf844e181663ab075ea1fd96f02e265bb2afa4c4919098b3221ac1946e836bfbd136ca8e7c4ebadb96be35bb3a11b50548
-
Filesize
5KB
MD509c52314d2391191e0d3f7ac8e167507
SHA1667e2e43f3937fd65ba153261d0afbc5a474aaaf
SHA2561eacd1f38dc7b28b5ae221558029e83a7a91785911a7bd254d325005750a300b
SHA5122779ee48f86148ee5422564a9d186c1f973aa21437aa5e485ba3da6beb1b296df1826402d4d806d512a0e41633635787f1b7e4de751fd8ae35b287d4c5d1de65
-
Filesize
5KB
MD545170b4abced612a9e9fed6b54bc6bd6
SHA1ff776426e9a6d82f09dab2f2135b097a85cb51b8
SHA256153c52b0212654a2417c8e25fd83a4c56b58cf1f1278a8666ddf8c75a89d5438
SHA512be818dbb7dd342a60ad3d2d0fd78fe72400b6d8f5f90c842922acdbaa988b8388e68680c54197fec90e356305528b1c09ac38887cbe27169b648b78a8e1611f2
-
Filesize
114KB
MD5c3f4763c0af9de827b2a18f242f38141
SHA1249670f45712a9f925d478ceefbc6f35f3b34381
SHA25636d5ef287fe37155a0e15f96acd85c225ef0ea7526e08b18df8191cd233d4ea2
SHA5126070e5348426c7e6661b69d0907360298f31d21ed6e2a642098b6a3114f58c9fe5a0024d8d17447817bde58328b64a3c93466d5d7537358e87b6077d9be5d6c7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd