Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
108s -
max time network
101s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
05/03/2024, 12:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qq.com
Resource
win10-20240221-en
General
-
Target
https://qq.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541168454569377" chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4176 wrote to memory of 192 4176 chrome.exe 74 PID 4176 wrote to memory of 192 4176 chrome.exe 74 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 2140 4176 chrome.exe 76 PID 4176 wrote to memory of 1472 4176 chrome.exe 77 PID 4176 wrote to memory of 1472 4176 chrome.exe 77 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78 PID 4176 wrote to memory of 824 4176 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://qq.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd4f3d9758,0x7ffd4f3d9768,0x7ffd4f3d97782⤵PID:192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1752,i,6289190575077335379,4514639182086848761,131072 /prefetch:22⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1752,i,6289190575077335379,4514639182086848761,131072 /prefetch:82⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2052 --field-trial-handle=1752,i,6289190575077335379,4514639182086848761,131072 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2848 --field-trial-handle=1752,i,6289190575077335379,4514639182086848761,131072 /prefetch:12⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2856 --field-trial-handle=1752,i,6289190575077335379,4514639182086848761,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4156 --field-trial-handle=1752,i,6289190575077335379,4514639182086848761,131072 /prefetch:82⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3768 --field-trial-handle=1752,i,6289190575077335379,4514639182086848761,131072 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1752,i,6289190575077335379,4514639182086848761,131072 /prefetch:82⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5de30cdd5df6672bf3a032acdbee8cfab
SHA18e469779e5b68d089eb31dd8b0cec6b12d17f336
SHA256d53d8a29848fd5b50ff21c1df05678a79d603738b82600fcda6ee7e3ca671f2b
SHA51281bd9d8347dcddfbbcf04ff77564f90ea748c07a297b4719013114ffe01d8903bf18de965a6d013c9c06f0bd0af1bb3d9d2fff4fca41aaa5852227dd436d1ce4
-
Filesize
1KB
MD5e62d3125cedbd3dbdcc93ccc678ac1eb
SHA1b6484b7840d253049c0ec3bc59f7bd4623d490d1
SHA256af19032000f764287a09f37833a63a296173423077c737b9043ef1a40db8fbeb
SHA512645da724824fb27eac629343e0063e2f6bd4297e71709d137bf7cbf20206e6028f06785a8bd1172624ed4f56bdb04bb5991b242a8186d98c54771d8b51f75f15
-
Filesize
1017B
MD57f5bd8c2ea6b3f51f2033b584e7d0d2c
SHA103a03dbc609958bab1995f41ce584e38ec8668e1
SHA2566db0839a2dc85b918e71e371c36b542ce48aa31ad300346911af4ef38061a0d1
SHA51211f66b4133f8a9e77afb829c2da41d846be3b3636bef5bd3df2557a94e4f6f350677c84666bbe4377346bc310cecd47c6346100268435092ca0306c8213a8ed2
-
Filesize
6KB
MD5ba4bb1293c2ec3d4b66dff9e15518ac7
SHA148a4b53a67b8a16e15a0b38e00271259b7d96666
SHA256613b8e97e4cc7a2cbbc169de3c25d3316a0740e1d0ca58bd52685a40f48a7a7c
SHA512a7324723c94fc929e19c7a782432d5bd303d3ca197c0b9b0cd58c480c3cdc20009e5403aacdf3f64b33d0f64398d7219e35a58ac58ec38113af2b484000cd157
-
Filesize
5KB
MD5517e81d038dff11c135b4f11c76f0665
SHA1c60cc388a3af7ff90eb4aa5c005dc070b749f976
SHA25644b397c9d3da9be743cd1d3ee32acf1372c4b5d7df793c9f31267453011c53aa
SHA512783e02654e16c7579c33c209fae7c8bbff1af053a063c044d15539be39bd71f1b88ee17b11b6d95abaf8ee2ad03444cd86402b52a03b4a01d85abf29cdf92a55
-
Filesize
5KB
MD571cf3c5e608f72dad85ebb454e704b74
SHA18127b6579e1c762221c9c46ac49d90e40c3b1730
SHA25643bb34780f675ae240dca85bcef9dac19d095ac0e108495f50466046f2daf1c7
SHA51239f226c46c98babdede8d3e6e69f2fdfafec5e636ccdf593ab94b111c6395972a0e905a88119419f4a4e610dcdb98eb2063217fca85a84c8f9c2f14bfd97e376
-
Filesize
130KB
MD56a46732a42ce9e8a7dc8611c414a4fb9
SHA16fd0684faa26b462fbf522ed5c4584076a8c6422
SHA2561c7c5c63f5bbd587a57f171c3a219d5e2c99cdc1f1e50268fd3b12dcd6a1c18a
SHA5120e3658e4250310b008f85c1902101fb605deef2752b91e0e9890aa55781b65b6c3107b6f7224bd01961c5c67d71d4bf8e798da6ef3c05819c89dde74e3a1b8db
-
Filesize
93KB
MD5d098e34a3ff017b5d723c398e1223dcf
SHA15c46c689c6d251f305d256899b2588481457c600
SHA256239ecbc2357b887b43a67a6aa71cbeb455d3cdf9997ed8f06806bc6cca854a1e
SHA5124a813ec40149d17aa7bd74dd47a10cd10d7dfe1c789bfccd53c5005ef03c62022c92cfcfba0bba122e6af9185071eaa61a6691ec76aaeacacebc995c112033a4
-
Filesize
91KB
MD57babd7a5b3956e402091a03ad63d0421
SHA18091dc85b236b07832404ee051baba5aa9570933
SHA256e03c1f2057b8eab655758724ffdce344405c407aee3b7cb45ab1b07b456d1b94
SHA512a48fb60eda9cd9d2ef960267f2625932e5d9f1020d9ef13809b9be1735d2eb98a84fe9d0a52552cea2c582f9fab201d990ee1f6e6e90fe2490c5c96b2e65741c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd