Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 18:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://share-eu1.hsforms.com/1E78yfIWDQzup7VUP7aKNRQ2dpqi7
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://share-eu1.hsforms.com/1E78yfIWDQzup7VUP7aKNRQ2dpqi7
Resource
win10v2004-20231215-en
General
-
Target
https://share-eu1.hsforms.com/1E78yfIWDQzup7VUP7aKNRQ2dpqi7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133505959308559736" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 4804 chrome.exe 4804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3920 wrote to memory of 528 3920 chrome.exe 45 PID 3920 wrote to memory of 528 3920 chrome.exe 45 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 4896 3920 chrome.exe 89 PID 3920 wrote to memory of 3628 3920 chrome.exe 90 PID 3920 wrote to memory of 3628 3920 chrome.exe 90 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91 PID 3920 wrote to memory of 3040 3920 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://share-eu1.hsforms.com/1E78yfIWDQzup7VUP7aKNRQ2dpqi71⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc41139758,0x7ffc41139768,0x7ffc411397782⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=316,i,15970365683679925053,9752952382212900615,131072 /prefetch:22⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=316,i,15970365683679925053,9752952382212900615,131072 /prefetch:82⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=316,i,15970365683679925053,9752952382212900615,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=316,i,15970365683679925053,9752952382212900615,131072 /prefetch:12⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=316,i,15970365683679925053,9752952382212900615,131072 /prefetch:12⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=316,i,15970365683679925053,9752952382212900615,131072 /prefetch:82⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=316,i,15970365683679925053,9752952382212900615,131072 /prefetch:82⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=316,i,15970365683679925053,9752952382212900615,131072 /prefetch:82⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=316,i,15970365683679925053,9752952382212900615,131072 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=316,i,15970365683679925053,9752952382212900615,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD575323799d7c314ac0336b3ee383c79d3
SHA15855a72b5ad44ff17c8a351483c52c70b72145d6
SHA256436c4baa1e16a4838dea1219ed5226ee378267463431f8be3b946e263ed75a1e
SHA5128a66f501306af69056bdb3b077f4985e94dddf71ca1dbc07f370241faa1a6b67e6c2b428a202ec6c77f235d2709cc1cf8b4404e13c5a451b7196a38ad0fc1245
-
Filesize
1KB
MD571c840dbbda58eef463fff7f58cf6e55
SHA1c6da851fa99084b11a82cd9b5e6f14e7e5ac5439
SHA256e7e7fba2e8a2c9df7c9f867184d784cd631141a1b1523609f8da50212d354fd8
SHA512024541b46c4f2da5769243faef9db3c92688332f1a6ce1633845d8bd2615303243f84802f14f7a88a2130027f2072fc86f1f3ef27d58f380b3c2e9f938525e7a
-
Filesize
1KB
MD5a887d0a03a7cc69ed95b902ed71f430a
SHA1e72e47e72eb959362dc34814466ed0920aff29a5
SHA2566776ee02c6a90598b2d4b0f9d55677d2e1423eb7cd22e2a5ebf8f6ae839760d1
SHA5128b28c88a00ab1816fd783095b721bfa666de6c647331d4cb791c6b5afa1dd77e8051218fda9ce234952d6bd191fd76484551154cb4f4e97b136723f9fc435822
-
Filesize
6KB
MD54b55df855c3203497cfc490b819ba926
SHA198c021a4d5c80e7baaf535ded2a42b07258238c9
SHA256bf10e4247e8073de3209b919ac68d056f925ad20c2747b956c19d799a1608909
SHA512e60f7661874a64ff53b9254e7d3be6c506a67294520d658569a641bd1044766a0b883b91c81436b80a4add7fc3622779bbee1c190089576dbec0944103db63f2
-
Filesize
135KB
MD571fe8896c9a6ee78a528c8b0748633e5
SHA1cf58924b94f7ad73d23a08fd0cea981013dbc46e
SHA25697f774bc6a8a1bae30326c1611bf7dc5bc4aceba40744a082fee754827cb2cd5
SHA51234351aed4766c649d39f9af37c895ed9926790f2cf50688f271762c4f74e4e7be52b1e3b102a811ff76f6e336dec67dfe9529d136cc4fdb5f6eeaa2b1812b25d
-
Filesize
115KB
MD5594f2cb883cdfeb5894d650f4017a580
SHA1ca348340236516b1ca469662cf5f7041c107f886
SHA25641329d4c081a0d3f149b615a2865242bcab90cf5ed14aee603eff9aa8a1a530f
SHA512bfe6fefb8c990282c7edc5e004dae1cc5f2f24e05b4707a106d67374eb49cb71b0138fb060917c258f0cc46a9e36a0e887638d37c30c769191024ffa317ff501
-
Filesize
115KB
MD566e6942ed787fca733e1d212b53064a6
SHA1cad5cbcdc16c4e3e65b20e93103868c88aea5338
SHA256bb93f274b6ea6d5f6b9544f3bd82871ae78aa5049697c9302c280634ed69f79f
SHA512a2b3d1b36eaa74827c64c2a26eab50f770483c635857e5fa5786b66eeb70a0ffe6d65f6d11485c41845cfaaad99ecfe71b17f8074bfcb0ed52b9d682510d3f94
-
Filesize
116KB
MD5694590ca4de141cd81a17580bcd72c56
SHA12a3fd9c0332e55b03179ca767c12a9cb2afb9109
SHA25676f80eda8c74d312eedbd9dfe4c8385b7606757ec0edc3f125ae08bae8287ab0
SHA512c4140b27df5fb30667adf6ae026027505910ebcea70ba2f2174ef68358ea6c0071b6090cc9cdd9067743632546fa36d92cb2584f14b1c5f86aadc875ae45943a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd