Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 14:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chromewebstore.google.com/detail/ahkjpbeeocnddjkakilopmfdlnjdpcdm
Resource
win10v2004-20240226-en
General
-
Target
https://chromewebstore.google.com/detail/ahkjpbeeocnddjkakilopmfdlnjdpcdm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548136215228432" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2336 chrome.exe 2336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe Token: SeShutdownPrivilege 2336 chrome.exe Token: SeCreatePagefilePrivilege 2336 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1800 2336 chrome.exe 87 PID 2336 wrote to memory of 1800 2336 chrome.exe 87 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 4396 2336 chrome.exe 90 PID 2336 wrote to memory of 5116 2336 chrome.exe 91 PID 2336 wrote to memory of 5116 2336 chrome.exe 91 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92 PID 2336 wrote to memory of 2296 2336 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chromewebstore.google.com/detail/ahkjpbeeocnddjkakilopmfdlnjdpcdm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5a1c9758,0x7ffd5a1c9768,0x7ffd5a1c97782⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1804,i,4169048340593652191,17141759105213103185,131072 /prefetch:22⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1804,i,4169048340593652191,17141759105213103185,131072 /prefetch:82⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1804,i,4169048340593652191,17141759105213103185,131072 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1804,i,4169048340593652191,17141759105213103185,131072 /prefetch:12⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1804,i,4169048340593652191,17141759105213103185,131072 /prefetch:12⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4396 --field-trial-handle=1804,i,4169048340593652191,17141759105213103185,131072 /prefetch:12⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1804,i,4169048340593652191,17141759105213103185,131072 /prefetch:82⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1804,i,4169048340593652191,17141759105213103185,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD593e7c16239dbaa1d7ce242fe773a0950
SHA169f8f623b98f7271246e5104e5b0be96666be9cc
SHA2564c08b630669724d71e5946faa29c85e9f62ca9e5aad1cb9625ffe27fb0f14d32
SHA512bf660c22bcd64eeb197953ef2a43e31bcf73564e2cf854384bdc1b050a9804581b7cbfbaa8fa24afe3f5621cc43ad72c2c88d9d9dfabf302aa8290c5dbf40c88
-
Filesize
870B
MD591a4645bd2232edc8b7174e72b68d122
SHA1d8149adb16ac23f3e0500b901a3aa599fc7d2fda
SHA2560b430364bbf63be0dbe0acfade5b12a79c9a2e831bc0f38dab7fd14b06d9a509
SHA5122c8c11de8b7d717062d18582395c278952ce6144902ed9631d7a83965aa3860067e11a78e5f074d2b6852280c7cb7d97d7b38b2ca4165090fc0d833951ce907b
-
Filesize
6KB
MD5650b613f384420dcc924db6b415d8dad
SHA1561031f0560be104fcbf41f26d22516ce5a3d793
SHA2561930c47f4443b7adbcdf02162056e5e6ab82a9f628b49f33bfff681dd7e551b6
SHA51257e8ec9042df424824725b26d94515183e5552bf4181ae8dd1d0639850104e504903ba6402447bccd48c7dbc04182b9cd2685b57338c69b3a0ea593ef39c2979
-
Filesize
253KB
MD5ac439e055716f6a13f84c8eebc699bd3
SHA1fd7165fbb5aef1c7955324b8a0ec3ce87d29ad37
SHA256b0b750208444dabbc393fa6bb88b7d54a1a47761b6079f8cf09f5e90743b752d
SHA51284f1b2c3d2135fff640b1a72b4efd3c94f56964c0c5dcef31bdee00cb66231db56f15735419dce64753c87a3d6a294ab6599c604b8dcae35de658c9eea60c077
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd