Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
274s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 06:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://solara.co.in
Resource
win10v2004-20240226-en
General
-
Target
http://solara.co.in
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559099637857945" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2172 chrome.exe 2172 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe Token: SeShutdownPrivilege 2172 chrome.exe Token: SeCreatePagefilePrivilege 2172 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe 2172 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 4144 2172 chrome.exe 87 PID 2172 wrote to memory of 4144 2172 chrome.exe 87 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1096 2172 chrome.exe 89 PID 2172 wrote to memory of 1780 2172 chrome.exe 90 PID 2172 wrote to memory of 1780 2172 chrome.exe 90 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91 PID 2172 wrote to memory of 3440 2172 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://solara.co.in1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad76d9758,0x7ffad76d9768,0x7ffad76d97782⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1844,i,12467189205287116715,12468396752645969485,131072 /prefetch:22⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1952 --field-trial-handle=1844,i,12467189205287116715,12468396752645969485,131072 /prefetch:82⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1844,i,12467189205287116715,12468396752645969485,131072 /prefetch:82⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2804 --field-trial-handle=1844,i,12467189205287116715,12468396752645969485,131072 /prefetch:12⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2812 --field-trial-handle=1844,i,12467189205287116715,12468396752645969485,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1844,i,12467189205287116715,12468396752645969485,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1844,i,12467189205287116715,12468396752645969485,131072 /prefetch:82⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4976 --field-trial-handle=1844,i,12467189205287116715,12468396752645969485,131072 /prefetch:12⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5008 --field-trial-handle=1844,i,12467189205287116715,12468396752645969485,131072 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5606db77e6877f7b88338e6163693fb12
SHA150e276888e2b8c3499fb2dc45a934719c671c412
SHA256b601ca3403767c5f70a5294493afcf08fd8a9e5ce7600bf9b524e306b6a46e64
SHA5121277aa10af0037606564aa6805c4049193f104bdbcbf2d8cdd262211054510500361580fae039ba344c937f38fe2376a622eb45857f0807015cef8e6fbc223bd
-
Filesize
72B
MD5d9fa110e2101c2e2fb4cf71e7b1fa02c
SHA1d7c594f817c2a9d45d47c955604d256d47606aa1
SHA25644fd4dafa7d1ac51707a5cc0707151e1e536d8ef38bb80dcb2cdfb7b0c47dc5e
SHA5125bd0c632ef142dc0f365def6448a18c925c41b6c224690b2797d6e4d044b7a148d85cfcdb9b07dcdd544f33c81e4b4d475d704d576ba51f65b655b8c6e4b54a1
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD59eadf267ce97e7b878067633f6baafd3
SHA182a40b1c23cfcdb78aa88634b2526d77b9ff89a8
SHA2561df0976fed9c6022babd598a95849e59912ed5b606b2d0e3df7e8b8c516818d9
SHA512aca6866b468e4af33c0e5af34e52269182e5de88e0d2b77132b23be1e28d93dae7239515fb3eb58f53ea799f1350adfc7d5bb51d4ff1bbcded02f1d07efbcf31
-
Filesize
9KB
MD5d6d891c86288e473979d2699921d5123
SHA1764c4d770fee3e0196e3afd8094ffe14ff5d86f3
SHA25668c0feb3d6d76c0c2d0fe1193a5103a84f93413324048caae92252a8cbd08e34
SHA512084bced27a0d1d7b7bd48d43685ba40171118aa81abe74c5dfd1d5399216587ac3f9beb35323c13592e898460916478af8b5c1ac9d7f97580ce627922897191f
-
Filesize
253KB
MD59795ea280024a03da0ff1454d98e2751
SHA15db7f60a588a431e3972255d8205befa8e201826
SHA256b3cbb846358b3ac61b83106fa7f58d4bc2ee6a1255ce80beb758d0ec38d7d281
SHA5128ddd113678f3d3916b7077ce2bd7c608d7797172126c605db1d895b807adc9319cec42a1331952ec6ff69d045d478b05cd212685df53e0cff09b03490a4ef302
-
Filesize
253KB
MD54e2ec6fc9589f0888110e7f5e9c754fc
SHA1d2bbbabf7dfab08459a6daa14b653357d7368186
SHA256f59fc66209b92032a07d49de18383f54ea48d0eebdbc441d6f089ab1fa9c2964
SHA51278c80e7f974ada7df26c925133eaf0b2e7713c9da9e54ec549b0f6fddc9c5eb376f7cd86c5b798de12772408cb02384a9c536ac2058a6e7963961f1ca56fa8bd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd