Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 12:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/forms/d/e/1FAIpQLSc9GYdTUoBvAU6LJDBo1EhDpMCQMx3wiXNsnBiQmtpoFaz0HA/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link
Resource
win10v2004-20240226-en
General
-
Target
https://docs.google.com/forms/d/e/1FAIpQLSc9GYdTUoBvAU6LJDBo1EhDpMCQMx3wiXNsnBiQmtpoFaz0HA/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559310755627181" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe 3576 chrome.exe 3576 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 768 4472 chrome.exe 94 PID 4472 wrote to memory of 768 4472 chrome.exe 94 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 916 4472 chrome.exe 96 PID 4472 wrote to memory of 1576 4472 chrome.exe 97 PID 4472 wrote to memory of 1576 4472 chrome.exe 97 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98 PID 4472 wrote to memory of 4908 4472 chrome.exe 98
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docs.google.com/forms/d/e/1FAIpQLSc9GYdTUoBvAU6LJDBo1EhDpMCQMx3wiXNsnBiQmtpoFaz0HA/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa06069758,0x7ffa06069768,0x7ffa060697782⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1856,i,3874843506555421006,2170543186968624498,131072 /prefetch:22⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1856,i,3874843506555421006,2170543186968624498,131072 /prefetch:82⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 --field-trial-handle=1856,i,3874843506555421006,2170543186968624498,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1856,i,3874843506555421006,2170543186968624498,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1856,i,3874843506555421006,2170543186968624498,131072 /prefetch:12⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1856,i,3874843506555421006,2170543186968624498,131072 /prefetch:82⤵PID:5212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1856,i,3874843506555421006,2170543186968624498,131072 /prefetch:82⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2612 --field-trial-handle=1856,i,3874843506555421006,2170543186968624498,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3364 --field-trial-handle=2276,i,1205556100727695622,5044463180471657307,262144 --variations-seed-version /prefetch:81⤵PID:6028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5bc8cd9f5c69ed2a5149c563e001c6460
SHA13beb3b19b63ddef7f1b97512a1fa4a536a00875b
SHA256d91de9e34033cacb499d40d15b8e943529ce9bb3f4f030b7c4cf6e7ee7dfa0e0
SHA5124c0c54b184e58aa97b29e10360b7b05ca855d0a9dcc8e36b0e1951311dfea8be4f04676d9c71cb75ebb78140a4172643383dbcc53f08e11e68dc2ba4026534c9
-
Filesize
2KB
MD5b1f736d95e58d7cd3ae7ed208786d4a0
SHA1897ee7fb76131c9bf80361213aa0c6af45e7fbc7
SHA256fb433481be77d6a247dfcab43a2193ba34ceb0870c834107b15ce7019a99d42a
SHA512866a6c333df81c5448da522c3ff9a4a31e9ec66cf7977690fbb026d7c47dda0e07c9c591b608fad45d19f98c49c2d6091263a7c8568216c4e61b957069a347b3
-
Filesize
2KB
MD5804a8b3d62b424fb3f7b649829b1fe95
SHA1901901e0b8fce6390b3b1c4ebf6fca7ebda67499
SHA2568b707f1cef2deb79b80057cbc0e136d710168188d9a77065b772fa64e9c5eff7
SHA5125f76487a4c4760578f358c1a38b5136b7fefe70cb5c37f6daae5edf574b81a7922b16d9db1ffa3aa25afe991426affdc99b8120a58e4d932307ee20c694ccdf8
-
Filesize
537B
MD5a6ad53f79571fb473c267ef5436b3d6a
SHA1e043ab0b414ef6ed9f47f1febfe4086587b87d0f
SHA256878480660fd9233403d380dbf21184df916810c752db6900510c09117b54da9d
SHA512e3bbc7c7745ccf0f5c679720dc8a8c20fb50881d32b16b3154ba5ab9603b5f71e5e806e94e31a5ed2379f1de803623be1841215e58e9f6d6c80c18166bdec1ad
-
Filesize
6KB
MD5563602d44abae3dac5b957e5f7ee0ce3
SHA1d6778c92f1fffdd12b351503b0201f5b7542d561
SHA256ae50cac54caba8f59aaf6cc1f5c95bfcd34f2e81f4f4fd297a5a18423fe99ba0
SHA51215bba8feaef659436dde68a7a314537375e7b515b10cf55525f766dd8e0b5f92299cb9f51cb94ff75032971df503145c1b5e2ab59ea3609cf11e44f03e3f4a02
-
Filesize
6KB
MD5795595319a407d9b48e3f2a0aee2c2a9
SHA1aa02faec690b0f875c1304b7fb77d4d26e5e00e1
SHA256f85d5c1a5a0099f6454a462f62c32558ef2ec03cba01c31c5cf54a49cfe99409
SHA512537e3ceec31ce97a41524cb8e2fac2b1ef1cb8d9c37d048a4fc2de764ce403d199520c135e99e1a961382467949409191b915e00cec7b5398876dfcb14469838
-
Filesize
128KB
MD509d2195ad5c97827fc6ceba55a0fddbb
SHA118d5747a3c3e244d09d36019612cc621ad11b41b
SHA2567579f026ef8f8f3e962e8e1f542328e2560322ad50ed55ced3c604fe1c501881
SHA512d7db498905fdb38aa0bca62ae73da74718933aa7cfb567efd1b937f126db56d233c079d83eae4d449cc021e5f5cd93d42439c1502a5fd82da3fdc7288b19ee34
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd