Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 14:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://northstartransition-my.sharepoint.com/:b:/g/personal/jyoti_northstartransition_org/EQ1Ua1hfweZInbnm955DvskBycTg_Js5loJmhuWVDGNheg?e=FFmbds
Resource
win10v2004-20240226-en
General
-
Target
https://northstartransition-my.sharepoint.com/:b:/g/personal/jyoti_northstartransition_org/EQ1Ua1hfweZInbnm955DvskBycTg_Js5loJmhuWVDGNheg?e=FFmbds
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548999922652400" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 4768 2900 chrome.exe 89 PID 2900 wrote to memory of 4768 2900 chrome.exe 89 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 3244 2900 chrome.exe 91 PID 2900 wrote to memory of 1852 2900 chrome.exe 92 PID 2900 wrote to memory of 1852 2900 chrome.exe 92 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93 PID 2900 wrote to memory of 2692 2900 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://northstartransition-my.sharepoint.com/:b:/g/personal/jyoti_northstartransition_org/EQ1Ua1hfweZInbnm955DvskBycTg_Js5loJmhuWVDGNheg?e=FFmbds1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7ad29758,0x7ffd7ad29768,0x7ffd7ad297782⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1592,i,6334981921468807428,14644169803692031378,131072 /prefetch:22⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1592,i,6334981921468807428,14644169803692031378,131072 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1592,i,6334981921468807428,14644169803692031378,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1592,i,6334981921468807428,14644169803692031378,131072 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1592,i,6334981921468807428,14644169803692031378,131072 /prefetch:12⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1592,i,6334981921468807428,14644169803692031378,131072 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1592,i,6334981921468807428,14644169803692031378,131072 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2348 --field-trial-handle=1592,i,6334981921468807428,14644169803692031378,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5ea576d4597da98770b60339fc9537541
SHA17530cb6caefcbc3046f3b1fbe4fb1d52d5423a46
SHA256a268ca7488446e36e6b58ee06b237cd2802831798d3a4aa2267d3f4350311b67
SHA51283c9b6def9a4e7da8659ba75ee1f16939bfa184a95730f629171683c14c06f27985fa759dab365000a1e438e091dca4308a6467d43c831860e90246dea6a8053
-
Filesize
1KB
MD5c803a93a590f2d82179016f2d2bf67ee
SHA1964ecbce796007e938c3072f2b89e12d41218b3e
SHA256fe0929e06ef0d35c3ee0187077d3e29966a34baa05283fab2f2fdec43ca2a252
SHA5125edb386ca879b7230b7f2c470cf3171ffe934f6653b7fef3ff2e161f2394bd98b2dc07e2978262023319dfbaaad102276ef2de7040b1aa90695041710da93271
-
Filesize
704B
MD50dd9d15f1ee584a5a4daf6358051f875
SHA138d5281f762be09fa67e5867e12d1c160e7bc0b3
SHA256af00168f3b478d7b8ba0c6d142c18eb72821496d7af9a7cb79cdf17aceb76498
SHA5121000cad8f59e89a2f4675e1fe8f3f38510c0acd3d6727b28dff15dd3869e76560b9ba9c71b7a67f5f9330dddd62f584a5ad0241e7337d92d6356d24796ce03fa
-
Filesize
6KB
MD56fdcc9a66c70cccd2ac20a4944e93160
SHA1cf52572f5e537d2265c2f23e5404c8664a41134e
SHA256a84567d1776ff5ddb27b04ff2e49413d7ec6a50f2d43140ef283d7c5abf142ee
SHA5123161c3eac4ab9df8b1e627684ead0091cdebaa024dbb8eb77cfee2115dd09eb21d08a0433ef1cfe04b4c06ab302b9633ad9ad6fa91e2837c2e120dd291ab7aeb
-
Filesize
128KB
MD57c70e01355067223fa4b2c39f5c5e9f5
SHA1bce63b75c2d3feea74eb40758cbacc36c436578d
SHA25693842e4083d462e045760b7dadb5b1e05bd9d0322dde4aa7d91f49d7570f02b4
SHA51231b47b5e5a4e397f14c904dae29fdaedfb47fc73024388865f1d165dc15c61c13365ba519773844d83fed6ca7ef3f505fcd3474caeb94a4752ac32a535c39a34
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd