Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 20:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=00186oipH2NWmHtg9Wz-KCzJQ76K0x-s0E81EAK1VkA_eC1Yw-pP7qVrCz0WMkH9weDUD1PlDVplLvFl1L-IiOOPiZMAuNtnKxT3GsbXkKWTPjj9O1CXbLYcQ6HqwfNuNI8sNQMiaH6OwXm539FjUqXzQ==&c=9bVDNfxG8jVxC3DGzivlpBptWEu0VZxzY3fjg2jfMpx82RzAoJnNfg==&ch=zddH3U1i4nJRDFNs-8tBGpl13R9i44HYsjj6RCSOxWyRqm7qno6yDQ==
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://r20.rs6.net/tn.jsp?f=00186oipH2NWmHtg9Wz-KCzJQ76K0x-s0E81EAK1VkA_eC1Yw-pP7qVrCz0WMkH9weDUD1PlDVplLvFl1L-IiOOPiZMAuNtnKxT3GsbXkKWTPjj9O1CXbLYcQ6HqwfNuNI8sNQMiaH6OwXm539FjUqXzQ==&c=9bVDNfxG8jVxC3DGzivlpBptWEu0VZxzY3fjg2jfMpx82RzAoJnNfg==&ch=zddH3U1i4nJRDFNs-8tBGpl13R9i44HYsjj6RCSOxWyRqm7qno6yDQ==
Resource
win10v2004-20231215-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=00186oipH2NWmHtg9Wz-KCzJQ76K0x-s0E81EAK1VkA_eC1Yw-pP7qVrCz0WMkH9weDUD1PlDVplLvFl1L-IiOOPiZMAuNtnKxT3GsbXkKWTPjj9O1CXbLYcQ6HqwfNuNI8sNQMiaH6OwXm539FjUqXzQ==&c=9bVDNfxG8jVxC3DGzivlpBptWEu0VZxzY3fjg2jfMpx82RzAoJnNfg==&ch=zddH3U1i4nJRDFNs-8tBGpl13R9i44HYsjj6RCSOxWyRqm7qno6yDQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133505148973383662" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe 1928 chrome.exe 1928 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe Token: SeShutdownPrivilege 4220 chrome.exe Token: SeCreatePagefilePrivilege 4220 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4220 wrote to memory of 4856 4220 chrome.exe 55 PID 4220 wrote to memory of 4856 4220 chrome.exe 55 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 4236 4220 chrome.exe 87 PID 4220 wrote to memory of 2192 4220 chrome.exe 89 PID 4220 wrote to memory of 2192 4220 chrome.exe 89 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88 PID 4220 wrote to memory of 4744 4220 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=00186oipH2NWmHtg9Wz-KCzJQ76K0x-s0E81EAK1VkA_eC1Yw-pP7qVrCz0WMkH9weDUD1PlDVplLvFl1L-IiOOPiZMAuNtnKxT3GsbXkKWTPjj9O1CXbLYcQ6HqwfNuNI8sNQMiaH6OwXm539FjUqXzQ==&c=9bVDNfxG8jVxC3DGzivlpBptWEu0VZxzY3fjg2jfMpx82RzAoJnNfg==&ch=zddH3U1i4nJRDFNs-8tBGpl13R9i44HYsjj6RCSOxWyRqm7qno6yDQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffd3c0f9758,0x7ffd3c0f9768,0x7ffd3c0f97782⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1888,i,10848001133408454170,241618205645507226,131072 /prefetch:22⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1888,i,10848001133408454170,241618205645507226,131072 /prefetch:82⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1888,i,10848001133408454170,241618205645507226,131072 /prefetch:82⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1888,i,10848001133408454170,241618205645507226,131072 /prefetch:12⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1888,i,10848001133408454170,241618205645507226,131072 /prefetch:12⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3940 --field-trial-handle=1888,i,10848001133408454170,241618205645507226,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1888,i,10848001133408454170,241618205645507226,131072 /prefetch:82⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1888,i,10848001133408454170,241618205645507226,131072 /prefetch:82⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=980 --field-trial-handle=1888,i,10848001133408454170,241618205645507226,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD5355465e893a2facb67ca36c28d62b4ed
SHA16336f7380f86bcde080602781618a2bf0352b1f7
SHA25671be9b9ad96770024b049541c7ddb53dd8099b7a0eaee0b94662c057f9986b87
SHA512a0237f64b2354bb032bae3b38788afc7eae7ab3b50598c7340dd9c8f2cfc5bc0e87f8e774f00bab580ebbebfa04ae3f260b5b902d2f8e1998960a87ae03d0f14
-
Filesize
2KB
MD575c31f414299ad75dfb565f79a89be2a
SHA111acd50fcace3c682167020de33b888ff0517cd9
SHA256a6b163bf95059a50b4e013aaef9433ce933523fa91c0aa80ad3d0740d3a59a4f
SHA5128b2f52af7be354e829a8b8d7cadded7485ba44a9ca82cd53079364a87cb948cf697f3ec1723970e50507d1f913d847dbf9ed57105b2a2464f1caa9a23810957e
-
Filesize
1KB
MD59270194eabe2ed0d782669a639056667
SHA1ee49f5b524868f7fa8f570a30e1b13af90ddc857
SHA256cdbc30dc26e1dda30bfda682cd7390e33ac92adfda4aca90ded2c388207ebaa3
SHA5124bcaf49c28f125e046dd88174bc5b90c492abc5b4508b9ce825fbb2934c84f04a5da6548c05fe7d852430866f07985016c4560b6dc85d66b57d14886d4ff5a05
-
Filesize
6KB
MD554a02751dd2d578b1a8f0a26dd805173
SHA100f2b4841ec7b10ec5eeb5306e3ed72a2d37c76d
SHA2563baae5ef0053865f3f21eb4e4635943b99988279e9e05307685ae10e9d2e934c
SHA512cfd489837231bf6083a35d137982ec5d5b39334bb5a0edb3cce407187cb5c65a316cedeb945d7f2a37837e7760c2aef39c84bc9ff831f81665550faf55a360f3
-
Filesize
114KB
MD5257e19642b5f81ba624107ab11343893
SHA1d75cb791d762f9378b8d73f4192926b974ba77b7
SHA256f9bfcb39f4d9060867a0069f2a729599236421fe679f39c804f5fd47f0408d42
SHA512370e0886b92e1175adadedf94f89e67cb82a9ccda852e2e2fda08e5885e3a6ea0dea47c0a8aa51e081c8d95ec754fa9cdfd431059f18c4f425fc6fa8c0d8cd3f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd