Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 11:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://apps.identrust.com/roots/dstrootcax3.p7c
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://apps.identrust.com/roots/dstrootcax3.p7c
Resource
win10v2004-20231222-en
General
-
Target
http://apps.identrust.com/roots/dstrootcax3.p7c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133510003311528598" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 932 chrome.exe 932 chrome.exe 3848 chrome.exe 3848 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 932 chrome.exe 932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe Token: SeShutdownPrivilege 932 chrome.exe Token: SeCreatePagefilePrivilege 932 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe 932 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 932 wrote to memory of 5080 932 chrome.exe 85 PID 932 wrote to memory of 5080 932 chrome.exe 85 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 4924 932 chrome.exe 87 PID 932 wrote to memory of 3184 932 chrome.exe 88 PID 932 wrote to memory of 3184 932 chrome.exe 88 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89 PID 932 wrote to memory of 4508 932 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://apps.identrust.com/roots/dstrootcax3.p7c1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbda1e9758,0x7ffbda1e9768,0x7ffbda1e97782⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1888,i,11227129418250672498,3672401477753427234,131072 /prefetch:22⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,11227129418250672498,3672401477753427234,131072 /prefetch:82⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1676 --field-trial-handle=1888,i,11227129418250672498,3672401477753427234,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2704 --field-trial-handle=1888,i,11227129418250672498,3672401477753427234,131072 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2712 --field-trial-handle=1888,i,11227129418250672498,3672401477753427234,131072 /prefetch:12⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1888,i,11227129418250672498,3672401477753427234,131072 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1888,i,11227129418250672498,3672401477753427234,131072 /prefetch:82⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1888,i,11227129418250672498,3672401477753427234,131072 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3304 --field-trial-handle=1888,i,11227129418250672498,3672401477753427234,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5fa31598891b35ca991b57d3082de0670
SHA17f6050d094634cb665f87f85d5189dd51befdd01
SHA256209e09ab410c8d23c5ca99a7d5e8e2ba4f9978d0466e74a0ca4ae84dea68cc25
SHA512e33abf2ac0ef381f81a4028ab60ceb03067e37b52af12f5e28106cef469f60bc8004971d80718b67afe33fb1656d8e6c0349383d836050de406ff3fc52e31c18
-
Filesize
6KB
MD5f77785a1cb2a6a2a5db9af426cf7d23c
SHA1363b0e1ff2ebb00bba5987734ade908003207967
SHA2560d7bb5906bfc9956ec5e7135813cf5552feb12201970a4c3e65b58ec7d2741da
SHA5123a8f6d367ba5797f4dd3336f1fbbdf3066bd23c6755d52490821e45333585e07f8b566592f82dbd9effe4e33c7a0116b0a8ec1080578b6c25dba5c31c43defd0
-
Filesize
114KB
MD547a5cb6f3d127e5803879fbe1576057a
SHA109d931a9f1cae064205698a7ab31598bd57fdeb6
SHA256485354dd2cc6957d828ce8c27d9bafbd8481c86b4543f4b279b82b6b275da5dd
SHA512dc6c60bb06758f2c3d3382bd63e3f58bec0a7b8b9982e2dd0df625e8f9e3ce5e73ca9625237f38415a37f1c52c9be95b32439610b5b084991077c73f87652e3e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd