Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 10:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lav1.me/p.png?pixel_id=17101896955892840
Resource
win10v2004-20231215-en
General
-
Target
https://lav1.me/p.png?pixel_id=17101896955892840
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547114042701907" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 832 5040 chrome.exe 83 PID 5040 wrote to memory of 832 5040 chrome.exe 83 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 2160 5040 chrome.exe 85 PID 5040 wrote to memory of 3296 5040 chrome.exe 86 PID 5040 wrote to memory of 3296 5040 chrome.exe 86 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87 PID 5040 wrote to memory of 3572 5040 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://lav1.me/p.png?pixel_id=171018969558928401⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff983be9758,0x7ff983be9768,0x7ff983be97782⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1872,i,11475089018596032091,14768217249500506935,131072 /prefetch:22⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=1872,i,11475089018596032091,14768217249500506935,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1872,i,11475089018596032091,14768217249500506935,131072 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1872,i,11475089018596032091,14768217249500506935,131072 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1872,i,11475089018596032091,14768217249500506935,131072 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1872,i,11475089018596032091,14768217249500506935,131072 /prefetch:82⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1872,i,11475089018596032091,14768217249500506935,131072 /prefetch:82⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2492 --field-trial-handle=1872,i,11475089018596032091,14768217249500506935,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a87fff75b436f905c9d2df897f582ff7
SHA1cd41cbcdbd6206c23db5bc19d7b05c9e919dc43e
SHA2568eed344ecb66c4c86f9a82779a28d7597ce9e4e02be6658a52aa1e2414bec15b
SHA51203afc420553061c1d0f485d8b482e53c9100b6f366ec750a7ed634992e5554659db12fc3dc4bc168a9de8e3daf20534daf3e4d44c9dc20919cf68467f57143c5
-
Filesize
6KB
MD5747f83fb24bc22c80a7962103a8cd315
SHA1c26b6d51fbc84ffc75f6ca620c1642a49eed6b3f
SHA2566f9a23a1d758c88deb3c97c0e7073e00e556c74db43b081ea9ec0113380c5dc3
SHA5122d1153da9bb6fe38677f7fb9bb6599ef2c386ee4eea1a2dc3455d894d2025cb004e83193da8678ad7a27e6d5680606dfd296fe8787bd0ce63a4848cda0fcd6e3
-
Filesize
6KB
MD5f6da43829521e2b50c2fe4fac4494a8c
SHA11e4cf35cd5577d6012e8f474fe37069cd5a3f015
SHA2562296825201e6da96ceebc9a7f2db949f29396a76cc8edd584f674c230aec89f9
SHA51202b61b843f84637b1f264d2f474f4a60c3936fbec7609deabba6543a018503f4c297daced50985fe495c16c0f05977e074962363a010cc7b5b550125382fd4b9
-
Filesize
114KB
MD5f44030798e38fe67debeb9670590333e
SHA12fb01bc400f22fcc0812bbdbb9524a313ad9e2ac
SHA256596e4f08dc3f942f3a5d6889f5fb092fd58e84cb7eaa64883033cf766cfc9092
SHA512f93853229bce6f0720c03cff61564be9a7b138232dc66fd80fff6350310de56bae53117000280d654d5cc7f4a88ab8665125409489c6680bc83cb1228480292f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd