Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 16:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://stratgov.com
Resource
win10v2004-20240226-en
General
-
Target
http://stratgov.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133542168998168432" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 820 2592 chrome.exe 87 PID 2592 wrote to memory of 820 2592 chrome.exe 87 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 2984 2592 chrome.exe 89 PID 2592 wrote to memory of 4624 2592 chrome.exe 90 PID 2592 wrote to memory of 4624 2592 chrome.exe 90 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91 PID 2592 wrote to memory of 1540 2592 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://stratgov.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0a8c9758,0x7fff0a8c9768,0x7fff0a8c97782⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:22⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2788 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:12⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2796 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:12⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4664 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4912 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5004 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:82⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 --field-trial-handle=1896,i,10752182408837208972,6885058450349951797,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD589d79dbf26a3c2e22ddd95766fe3173d
SHA1f38fd066eef4cf4e72a934548eafb5f6abb00b53
SHA256367ef9ec8dc07f84fed51cac5c75dc1ac87688bbf8f5da8e17655e7917bd7b69
SHA512ab7ce168e6f59e2250b82ec62857c2f2b08e5a548de85ac82177ac550729287ead40382a7c8a92fbce7f53b106d199b1c8adbb770e47287fc70ea0ea858faba6
-
Filesize
624B
MD50430fa571fa51f3c1599a25939de7598
SHA1bf1f676eab3cf63d89ab88edaa5312e6abeeeade
SHA256e7a22d31a186f7a5302a4f130090e16f99acdb39de3a3b06c0ef60ecc5883be7
SHA5122b61ae7d62407fbbb4b3cecf4ca282347d9447aa9b1927521a645f5aec8315fd17672463b760cf342aa8e70f3f837ddbf6a32dcfb2db1c710db9bd8ab8a802ed
-
Filesize
2KB
MD50e1e71290cad8b259f65421c2f66ad45
SHA15673bd4162b0174892b167dbbba9217c111da148
SHA2569e0f4fa1637a50146963fe1e75811fe03ce32f20e51262362c826940ed6e5e1b
SHA512e8121823b904f75da04505b1452bc93a3c312de219514a1663f7b022db0ef2c119651db874c723e99d2cb673ea7959bfec7b780f586b86266e4d2abbde322f97
-
Filesize
1KB
MD503f52fd1ca6aea741ec578e721cbc0eb
SHA129bd64df48b86fa664cd37b2438938bb5523b6e9
SHA256c3f59b203981b9fc9e48c20223f4914f7dac5e1768a420cfbadc1cfdfcbf5281
SHA5126533fe7aec6796d62edabaa67c44e8aff33e0f8f03e1151735414a9d198ace7d05c5044b0e6063dd6a2dcc645d4889abb7c164cc946310b04c0beccc4d286652
-
Filesize
1KB
MD5d24f81f53a6d4bf4fa17a7303ebf0fc5
SHA18fdee370e097bee187b8cd41dfb488cfb8009084
SHA256f1283e5d41bc82e8137ff7e324be0a9462cd0ad05fe5f5682fab011561aa4009
SHA512fcea7c150a566971c66b6ca39d35a8d701e7be5fa5aeafe63724d42c5484feaaada73ff4e35b914da079ed270be6e5335db8c3b2f7b5343161e07f1d84025c12
-
Filesize
6KB
MD5cad12d3327d5dd1aaa1af0859dc9b7a1
SHA1fc408d812a66c00b7152d0c6274d4c02088e6023
SHA256018ee0934f9748dd69d933817c67aa254ef461a8cdbd346db8a3bbd0a3ae2bdc
SHA512eba478a9e91ec517620aa8f7aeef920b73fc98dda9c8885ecfcc3101e994cae716547cce1ca37186333c61ba0c47725223e4a84921757295aa4adaa1eeb7653e
-
Filesize
128KB
MD5ede0fc31a893bfe58bef2f8fc35cf3cc
SHA11e2e176dcecfc050cf0fb280a22e996f1bcc227f
SHA256bcc5f30ad5630b92c9438509dadca492ba63869a773579698913473ede93b8de
SHA5128bad57518b2a49c5b6e180d50dea1aca354783f15be43e1cc0a1869b8e287c056b055f7f506109a1eb21ab0b414b31bbfd0f10d638c9b9edae8b8116c6e0eb0f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd