Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 11:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.iowaworks.gov
Resource
win10v2004-20240226-en
General
-
Target
http://www.iowaworks.gov
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541103865994069" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe Token: SeShutdownPrivilege 1508 chrome.exe Token: SeCreatePagefilePrivilege 1508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe 1508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 3100 1508 chrome.exe 90 PID 1508 wrote to memory of 3100 1508 chrome.exe 90 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2348 1508 chrome.exe 92 PID 1508 wrote to memory of 2264 1508 chrome.exe 93 PID 1508 wrote to memory of 2264 1508 chrome.exe 93 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94 PID 1508 wrote to memory of 4480 1508 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.iowaworks.gov1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae68c9758,0x7ffae68c9768,0x7ffae68c97782⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1880,i,4507558760365447888,4850842487856981625,131072 /prefetch:22⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1880,i,4507558760365447888,4850842487856981625,131072 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1880,i,4507558760365447888,4850842487856981625,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1880,i,4507558760365447888,4850842487856981625,131072 /prefetch:12⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1880,i,4507558760365447888,4850842487856981625,131072 /prefetch:12⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4592 --field-trial-handle=1880,i,4507558760365447888,4850842487856981625,131072 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1880,i,4507558760365447888,4850842487856981625,131072 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3384 --field-trial-handle=1880,i,4507558760365447888,4850842487856981625,131072 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1000 --field-trial-handle=1880,i,4507558760365447888,4850842487856981625,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD5545c3bd2daca5ce271877b284b9f8d6e
SHA10dbb62cf1a95f313e0721a6d0e6638ded3096a38
SHA256bdee3da6b327b7f6980457740f13951c7b0e818ec2d682aff059dec873e40cbc
SHA512d016f7106c3446f2308966542e81ddd4b698dbbacad742225bb6d44c05b050fe3015b42084a14e5baeb8df5662d5fdaf638ccb52b21bc62daa31c89d526b72c8
-
Filesize
2KB
MD53b812a2e48d760b18f63cbee414a2d51
SHA13b262256091ae1367d7fc0336691ee6f0e001f5b
SHA2569ab74c15636d0304d98e2da7266e0b29e735ae535fd38a959cf01204b338f4d8
SHA512e55d70f85012e235c9b10e6dbc1767948958f975e2e9d04d923256a223ef019dda4d1637ed58cb799afd8e4c0130abdd083f000a6e87079d4afa48ac1242cdfb
-
Filesize
703B
MD5fff8ecbb98ebf8968beb24b85e1bb650
SHA1db2a7921d7f82d21a18e4040cf28da7839dfbea2
SHA2569ca6d286d5cf7050b5e0546fbf764b8af64247cc596f7a843791c135f2b1c894
SHA512b7fa6840651688f61175079cc6a72326f019e3d9024d10e02135acf1d8ea10943e1917124e4a7b8243d88fbb7677f4078dbcfd08e697086ff6bc61760cab4c84
-
Filesize
1KB
MD58f383ad5b00c31106b94d1c0103ec292
SHA1e03766f77a1e92368e962a932a9e2e2e3cab5700
SHA256ce61fa7c70123b7abd44c48c76230fd0b71147e72b7324631cf207077424ed7f
SHA5127a32cde1e58db4b24edc3621d2970f26e9b331e21af7014eb24c4ce1d7a3bee6869948e5bf93bd787ec90001d45e5a8ba48f353a8442f12044777e4f98c404f5
-
Filesize
703B
MD542b9066a186cf66d30021c1aedfc992d
SHA193036d622ad937bd75b746d145bc447b78e658fe
SHA25607b9a2fd19c9b378824e4b20bff1a8411b14391d38e7677fe3ff980ea1e3f221
SHA5129857964963ea6ead57bebbf56d1abd49cc22e212b03e8f6c82b4970c03a9a8074292fd952280d84510dc897a90bd7f80357ca3bb99e5e4988617738f3a7c0016
-
Filesize
1KB
MD50268b7b96833b0e75ad4c251fad11fe4
SHA1de5a4db2cd0d32212ca6b8aae21d7ee19b099b5c
SHA256338514c635f53ee23b162ce47818610390b7c823d38844226261f8b0c29d327f
SHA512270cc42e7217500c56c7c04296c2da62ded5b2ffd586290c183454fa63355552e9c4bab4a2baa415a84b4cabfd2376c5e272816e0bd9e1be2378988f716f572a
-
Filesize
6KB
MD5192c43210cf8a0f0899a88e090b918d9
SHA1471ff687d19abd7c968335e4347ba7045e2f4fd4
SHA2560c6e74b5c4189beda2dd926d3b0c912155314b35baf6d918977e7aa03ebaf8b8
SHA5124e0a1bdc4cab995a20ee21c3c4a27d160ef0c05540bed2607fc04a6435b282f8b1306afa5a5ad33f1b59f25ac5dce5c7c41303130a055b827ac2c18a21f6082d
-
Filesize
128KB
MD5bdb36445b40e3d4bdef7098ab5002a15
SHA1de0f3318cef6050d9c0adfd7e442e6b209f17e69
SHA256eae5b88d0aeca0186ef33d2704d696025448df859562f2e2324710d80e516904
SHA51241d383736e9297609f211f61e62ac7c70e14e1dc0bed0e7f2f261dfc63b351c7aabc896964ecac222e5c223eb32b2d13b935672d4256e08c8f6fbfc203609473
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd