Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
261s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 11:02 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ci3.googleusercontent.com/mail-sig/AIorK4yb-oL9N-NMNKziPhCug6h67RVnW-J-9xabFUJkq0I8-djpdIlFY5hYO4O8ZEoSfe0Di5MQJ74
Resource
win10v2004-20240221-en
General
-
Target
https://ci3.googleusercontent.com/mail-sig/AIorK4yb-oL9N-NMNKziPhCug6h67RVnW-J-9xabFUJkq0I8-djpdIlFY5hYO4O8ZEoSfe0Di5MQJ74
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531597440050034" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4040 chrome.exe 4040 chrome.exe 2676 chrome.exe 2676 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4040 chrome.exe 4040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe Token: SeShutdownPrivilege 4040 chrome.exe Token: SeCreatePagefilePrivilege 4040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe 4040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 3344 4040 chrome.exe 65 PID 4040 wrote to memory of 3344 4040 chrome.exe 65 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 212 4040 chrome.exe 91 PID 4040 wrote to memory of 5100 4040 chrome.exe 93 PID 4040 wrote to memory of 5100 4040 chrome.exe 93 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92 PID 4040 wrote to memory of 216 4040 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ci3.googleusercontent.com/mail-sig/AIorK4yb-oL9N-NMNKziPhCug6h67RVnW-J-9xabFUJkq0I8-djpdIlFY5hYO4O8ZEoSfe0Di5MQJ741⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1c539758,0x7ffd1c539768,0x7ffd1c5397782⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1864,i,9849088731014497580,9533965311946709856,131072 /prefetch:22⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1864,i,9849088731014497580,9533965311946709856,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1864,i,9849088731014497580,9533965311946709856,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1864,i,9849088731014497580,9533965311946709856,131072 /prefetch:12⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1864,i,9849088731014497580,9533965311946709856,131072 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1864,i,9849088731014497580,9533965311946709856,131072 /prefetch:82⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1864,i,9849088731014497580,9533965311946709856,131072 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3740 --field-trial-handle=1864,i,9849088731014497580,9533965311946709856,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4492
Network
-
Remote address:8.8.8.8:53Requestci3.googleusercontent.comIN AResponseci3.googleusercontent.comIN A142.250.179.225
-
Remote address:8.8.8.8:53Request84.177.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request202.212.58.216.in-addr.arpaIN PTRResponse202.212.58.216.in-addr.arpaIN PTRams16s21-in-f2021e100net202.212.58.216.in-addr.arpaIN PTRams16s21-in-f10�J202.212.58.216.in-addr.arpaIN PTRlhr25s27-in-f10�J
-
Remote address:8.8.8.8:53Request225.179.250.142.in-addr.arpaIN PTRResponse225.179.250.142.in-addr.arpaIN PTRlhr25s31-in-f11e100net
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestbeacons.gcp.gvt2.comIN AResponsebeacons.gcp.gvt2.comIN CNAMEbeacons-handoff.gcp.gvt2.combeacons-handoff.gcp.gvt2.comIN A172.217.169.3
-
Remote address:172.217.169.3:443RequestPOST /domainreliability/upload HTTP/2.0
host: beacons.gcp.gvt2.com
content-length: 311
content-type: application/json; charset=utf-8
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request3.169.217.172.in-addr.arpaIN PTRResponse3.169.217.172.in-addr.arpaIN PTRlhr25s26-in-f31e100net
-
1.5kB 11.2kB 18 19
-
2.1kB 7.2kB 17 18
HTTP Request
POST https://beacons.gcp.gvt2.com/domainreliability/upload
-
71 B 87 B 1 1
DNS Request
ci3.googleusercontent.com
DNS Response
142.250.179.225
-
6.9kB 123.4kB 55 103
-
72 B 158 B 1 1
DNS Request
84.177.190.20.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
73 B 173 B 1 1
DNS Request
202.212.58.216.in-addr.arpa
-
74 B 112 B 1 1
DNS Request
225.179.250.142.in-addr.arpa
-
204 B 3
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa
-
66 B 112 B 1 1
DNS Request
beacons.gcp.gvt2.com
DNS Response
172.217.169.3
-
72 B 110 B 1 1
DNS Request
3.169.217.172.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD562dd4022c94d2515dae8b8ef77f0cbd6
SHA1a65308c21ca176374ba36d445435ca9b162cfd11
SHA25673659feea41c107a0fbc7edc7655774166d525930f6c1641f2f805243e23b5f2
SHA51246a318e9727e03884817591af1670cd41d8536e375921e7367622603fc3dc05bf8d8a652f7454091447e00d43c5b917ebf4d95d143a924edb9e72738db6baadc
-
Filesize
1KB
MD50a4a6c77e66ef46b4782c78f651a06bf
SHA17dab1fe06df2e0746892d0f296d7d8ab62a99a51
SHA256371ccaa0013aac25623741cd0b3aa3f41be0da373697736876c5328097118066
SHA512a48ad34cf85775d4135a200693ea40501052b1e7f707230ba9dbeabe74363eaa383f392020eec64adf1e78d19d37540606c0bd028ebccc824f42fbc7b69d06ae
-
Filesize
6KB
MD5f31ad4d2cb7779057d31a2daa7edec95
SHA1de16d091fbfa44fd0642bbee95ece8ddd77aca50
SHA256dd09530135382eb4c61c3c45761a274d0e7e3df3241e33e99860cef2afb782a2
SHA512e3f3d1d2066da28fba26d4129c34d22ebb93a29fd94e522c65b11a97b82ee48e73dadc63f8b9d076453fce9c42a970983cc1fb49137cafb6b80f151df982488a
-
Filesize
130KB
MD5f8520fbc3cd8af075195e308ae3c3223
SHA138be706dbf5632f8529373f371145c0ee5e094ec
SHA2560ad0da1ab79f45a8f27568ed2f03bb5caa9f720739603f009122a2b067dfbc8d
SHA512c0b34381e8bf813f6752afd860fa6cb85e84793e9385327cb81f6906cc6cfb61d51ec05586829a0a5e345b38759859ca1a64842ef602b94d55e619f65ea76330
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd