Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 10:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pub-3c863d6df3ad4c77b72bfc1180127ffe.r2.dev
Resource
win10v2004-20240226-en
General
-
Target
http://pub-3c863d6df3ad4c77b72bfc1180127ffe.r2.dev
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546279011251213" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3444 chrome.exe 3444 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe Token: SeShutdownPrivilege 3444 chrome.exe Token: SeCreatePagefilePrivilege 3444 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe 3444 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 2000 3444 chrome.exe 90 PID 3444 wrote to memory of 2000 3444 chrome.exe 90 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 1580 3444 chrome.exe 92 PID 3444 wrote to memory of 2492 3444 chrome.exe 93 PID 3444 wrote to memory of 2492 3444 chrome.exe 93 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94 PID 3444 wrote to memory of 3068 3444 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://pub-3c863d6df3ad4c77b72bfc1180127ffe.r2.dev1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2f619758,0x7ffe2f619768,0x7ffe2f6197782⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1900,i,6779334787820753103,2959333205076467136,131072 /prefetch:22⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1904 --field-trial-handle=1900,i,6779334787820753103,2959333205076467136,131072 /prefetch:82⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1900,i,6779334787820753103,2959333205076467136,131072 /prefetch:82⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2776 --field-trial-handle=1900,i,6779334787820753103,2959333205076467136,131072 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2784 --field-trial-handle=1900,i,6779334787820753103,2959333205076467136,131072 /prefetch:12⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4964 --field-trial-handle=1900,i,6779334787820753103,2959333205076467136,131072 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1900,i,6779334787820753103,2959333205076467136,131072 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=1900,i,6779334787820753103,2959333205076467136,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536B
MD554c27358f4bf489eb0b31828651f9eb1
SHA17f33daea2620ffc17c5c5481a9e8418e2433ceef
SHA2560c74d1b75978f29121ff643d33f4985a883e2c563bbb4322d480d82dd09692f5
SHA512d33a2f381d5e2983aa8f4e8b9d94354f78ac45985910b1a2495aacfc4f1c7de610227070bbfbee5e2c433aef010bcb8fd220ea1a79c68cd1ef559c7882946ffc
-
Filesize
6KB
MD5d8996c0be872c2fc6cd4c601cc5ef9b9
SHA1fe223d69807e42c89b22b1743dbbb02ea536ba3f
SHA2562bc432355ddef7f58eb360e94767c3848349da97c00c8236cfbc16e2b1fc1133
SHA51255102a7395dafd3c528a7ce494a59a4980c67c741539b56649d681e0c3b2e4aa30738806d0c28409dd246000c8919992048bbcde3a952d753faf008bd9bb89a8
-
Filesize
128KB
MD554eb9b843e9232e2070ebd03c42ac548
SHA12e4f0808523912452460bc342defa33717eb27c1
SHA2560b9ff1262eea269670eeee520e7e1270a39baa9379356999db17107697483a9e
SHA512eb0a8cd842c16fb67743bdca7dc390a09ac43580f8800e0e838daa54cc1c9b893aa12c513ef04534c8a9804a9c0d57ba668ca4882bed6c0a3554d651bec1e0c2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd