Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 04:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://blob:https://github.com/786020fb-ee5f-457a-b242-e69d9e692ef7
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://blob:https://github.com/786020fb-ee5f-457a-b242-e69d9e692ef7
Resource
win10v2004-20231215-en
General
-
Target
http://blob:https://github.com/786020fb-ee5f-457a-b242-e69d9e692ef7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133507160386530684" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 3664 chrome.exe 3664 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4476 5008 chrome.exe 88 PID 5008 wrote to memory of 4476 5008 chrome.exe 88 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 3620 5008 chrome.exe 90 PID 5008 wrote to memory of 4608 5008 chrome.exe 91 PID 5008 wrote to memory of 4608 5008 chrome.exe 91 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92 PID 5008 wrote to memory of 1076 5008 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://blob:https://github.com/786020fb-ee5f-457a-b242-e69d9e692ef71⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffc73359758,0x7ffc73359768,0x7ffc733597782⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1892,i,875641218163464096,1431814290005800784,131072 /prefetch:22⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1892,i,875641218163464096,1431814290005800784,131072 /prefetch:82⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1892,i,875641218163464096,1431814290005800784,131072 /prefetch:82⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3260 --field-trial-handle=1892,i,875641218163464096,1431814290005800784,131072 /prefetch:12⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1892,i,875641218163464096,1431814290005800784,131072 /prefetch:12⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4508 --field-trial-handle=1892,i,875641218163464096,1431814290005800784,131072 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1892,i,875641218163464096,1431814290005800784,131072 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1892,i,875641218163464096,1431814290005800784,131072 /prefetch:82⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1892,i,875641218163464096,1431814290005800784,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD537c911c6d7f56d846fcc1ec5984702db
SHA12f8cb0a8980643e0f1ac2e49aac79758b78b1f0d
SHA2565cf3a1c85021298f253a75dcb449a9d4be1db69274e0cdf82df4c317eb870ae1
SHA512790286f433428f615b8748bfbbc974e4840bcffcff345a9b55e96401b078f445ad08f02110ac1bfebad46762434952bbbce2e5cbcb6ea8aa3fdacc5a4d75de16
-
Filesize
5KB
MD5d0aee74c139540344655de2456a63e28
SHA1851b76abe351649f9654afb299629a95d9874ff9
SHA256b0085d22e6c48fee614641a7b9930f80ed08b1499df86900bba83d8ec5d95a5e
SHA512125612028f637773a2b352102618dc98a24e2a5a1080329893b1acacf25f52d1d53be41810ac109ae558f22fd7a8f861d97f0662bc74ab9f74f3acc09bc2693b
-
Filesize
5KB
MD53ef49aad307248bae43f7afccb636817
SHA1178d2a2f76f0e8fb7178972a0dc705547e3fea31
SHA2564063459446bbe0c88b5a2406f484988bc38004f54c349e510d1250014c94d24c
SHA5126cc100cec724a50f35231715285e533a6b7cc15ce3c0c2a74fecf22b90ebc9a0944286263ca73fba3e55d01bb1f605c8c188404bf606849613407f0fceca8832
-
Filesize
114KB
MD59930774a73d492e06b6d87528f11afa1
SHA1558add01fe92830c9ced6a7beaac305c0d8584d3
SHA2565d98be83bb09769adf44029ef5c04cd9623d94ce7a122260976a564548529920
SHA5124dc01849ec94adf8cbb262b47afa378beeda36bcea0c460892f4f809ed5401d386729755531b264f53b874445b3e8131438c392199b4012f6174319967a8b80e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd