Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/03/2024, 19:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.google.com
Resource
win11-20240221-en
General
-
Target
http://www.google.com
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 400 chrome.exe 400 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 400 chrome.exe 400 chrome.exe 400 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 2128 400 chrome.exe 80 PID 400 wrote to memory of 2128 400 chrome.exe 80 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 1140 400 chrome.exe 83 PID 400 wrote to memory of 3744 400 chrome.exe 84 PID 400 wrote to memory of 3744 400 chrome.exe 84 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85 PID 400 wrote to memory of 2132 400 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffeece79758,0x7ffeece79768,0x7ffeece797782⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1784,i,6317251356698793936,7925030533734585539,131072 /prefetch:22⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1784,i,6317251356698793936,7925030533734585539,131072 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1784,i,6317251356698793936,7925030533734585539,131072 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1784,i,6317251356698793936,7925030533734585539,131072 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1784,i,6317251356698793936,7925030533734585539,131072 /prefetch:12⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4432 --field-trial-handle=1784,i,6317251356698793936,7925030533734585539,131072 /prefetch:12⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4684
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4000
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD506d38d9bf028710762491328778f9db6
SHA183e1b6cbaad5ca5f6dc63453da324f8df28de193
SHA25691558d69c027808e375e11c80166dc6ba245fbcfce715c9588decc55b4a33dad
SHA512b197e5f92add72688396a07246ee9842a3b0de36508aa57f0254531cb109c77d0392e00ea28e006f9fbab1b8fee9b333998946de47ca7526b631e8c810780781
-
Filesize
144B
MD5c063e172ea225717199636ff82c4ad7f
SHA13668ed37cdec45ac3f12607bcb4c873249ba016d
SHA256facce735b759731dd69cd7d8a9defbf584091869daaf53172b1b365aaf4f4a5f
SHA51269e1dbc29c94ab022ffab71683905e14d752c82b7bda7bd5b237e34e27d23993e41fc2d3aecda6ac8fc1b617a1a7944d4f6d331c8470cc2e0e439a2e1a1d1c45
-
Filesize
1KB
MD52173ca8275a731869e1c92e119d5870c
SHA1c6c321321e15eb9d754103001748c2b73094996a
SHA256b8ead4a7e59a4d367f5d57da96478d7dd2d6142f9eac6ebacf13971e7d027a2d
SHA51298d996c74b6bdc7a065c98ebf8db25807f94f4aaa75478984c271390e22153ad9fd5a02e5fb400b7807a40abdb3c79b55c24854a4dfc4ba5f37d212191db5e04
-
Filesize
6KB
MD5f498119a7475b11fe13ef2b59029e8e2
SHA1d32935d1fc10e56fcaf66ae55238a6548b0c9368
SHA2567a28885b90a51fa6af848448a9ea8318aa92e439e64065546e810d4fc85830e7
SHA512ae1b5b5788b2566e4ad3203abe8d7bc02c567faeda16a976c7b2107f8e5006bd16e2f5e5fc750ef89ee548a8cb6d403812ff0f27a02f0402c31a94ca471b696d
-
Filesize
129KB
MD538e11e7b8ca52ac14409a1485d2ccf51
SHA1683496a310b8404cec001090d02dd05bda8f6d55
SHA256de980e73fa0a7bb146d8d7653351c3929b1aaebea3b0b435a53b12f8bf1e0c31
SHA512642c10100837b9aa28114f8257aa558ce9cc5150831e67b39ddbef735c256fff88cf04ece482405cf1edfbc84ebede94eac7b6eb57866f4e4e4c63ce4ab1e988
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58