Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
35s -
max time network
34s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/03/2024, 15:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://workers.dev
Resource
win11-20240221-en
General
-
Target
http://workers.dev
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133549031336451004" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1180 chrome.exe 1180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe Token: SeShutdownPrivilege 1180 chrome.exe Token: SeCreatePagefilePrivilege 1180 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2456 1180 chrome.exe 78 PID 1180 wrote to memory of 2456 1180 chrome.exe 78 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 2388 1180 chrome.exe 80 PID 1180 wrote to memory of 4864 1180 chrome.exe 81 PID 1180 wrote to memory of 4864 1180 chrome.exe 81 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82 PID 1180 wrote to memory of 3644 1180 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://workers.dev1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd71659758,0x7ffd71659768,0x7ffd716597782⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1840,i,17768018366950940417,11966292374432717834,131072 /prefetch:22⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1840,i,17768018366950940417,11966292374432717834,131072 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1840,i,17768018366950940417,11966292374432717834,131072 /prefetch:82⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1840,i,17768018366950940417,11966292374432717834,131072 /prefetch:12⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1840,i,17768018366950940417,11966292374432717834,131072 /prefetch:12⤵PID:352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5060 --field-trial-handle=1840,i,17768018366950940417,11966292374432717834,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1840,i,17768018366950940417,11966292374432717834,131072 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1840,i,17768018366950940417,11966292374432717834,131072 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD517be7138d8b05c5fa18b7599327c54f3
SHA1e817a4a50ebf48f6d278f35d13fca7d3020637b5
SHA256d57bfd2306e4b663e2b42292fdd8400ba0a0766fd51fabad157809665b964f9f
SHA51294363517255819b2f7eb317de9c975bd9be7753b8f149788f88e9ed400c23f19b7686eb91a0d1fefe5426293384b130f45cd24721d9f005bb48ff5333c9d26bb
-
Filesize
1KB
MD50c10e849f023287aaced9047051e9447
SHA15bda3c7b049f30d01f793700339cba7973799d60
SHA25675889971fa3c6fe4d940d5ed509b3a1a371595a145131143c109f8f1de3dd7d4
SHA5120c5ecdb2060624e56a5c5a8d2da1eb94931b5291766896979d3836dea9a6a791aef768571e5d51d9177d6c36720f8304ea57ad18c92c7e9d5cd95d59e6370625
-
Filesize
6KB
MD5e0ebf58155306c916ed76b2a80569e0a
SHA155b7d34224644eba4685c1e0623d462f6c78a334
SHA2561ce08e95d3cefea03f7061573f015bcca2e001a6def77391b96ddb1b9d54aaa4
SHA512c5cd8b02a5407f7fae26920d6b1868f7b977504939185cc10f150a1fc387dba4fb227d0eeb01c753fcd4797abfe3d270ab58b3bce644c5c97a6d6e1709987ac3
-
Filesize
256KB
MD532865f0944283d3810d844c65f78ea6f
SHA12e4d9f7bd9e2de6cca5c6d03b9920159987558b7
SHA2564cf07a291c59da513632c12e8b91644376d3dcef445731636fe9bc24cba750c6
SHA5126d95456117f176ee6c94081b16763b5491f539aabea2857d03e09a57c7bb8cfb738ace6c96049d6816cd53b1e40f11bee729188e95b0e81dcc98f8fae871fc9c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd