Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 07:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://r.apps1.lpcr.fr/tr/op/eVnlW3Sxd_QVfDmhQxY25tR0Rdc2Hgibz-QtQNUO6IZzL1oeXuaaDO-6m6TqQannQhYPeVX1CY5TmlQRGlsDSCe8ZJie4cGLimic_ZAffz28ny1pKX-tm_HUUBKxnNayhbOpnMeVpdn6IZCT9LesVs_iRgrUSd-9FeSg8mIhuzeEEo02MGqG-9Gb9YUW4zMCZCB-6YaSkq3x97GP8g
Resource
win10v2004-20231215-en
General
-
Target
http://r.apps1.lpcr.fr/tr/op/eVnlW3Sxd_QVfDmhQxY25tR0Rdc2Hgibz-QtQNUO6IZzL1oeXuaaDO-6m6TqQannQhYPeVX1CY5TmlQRGlsDSCe8ZJie4cGLimic_ZAffz28ny1pKX-tm_HUUBKxnNayhbOpnMeVpdn6IZCT9LesVs_iRgrUSd-9FeSg8mIhuzeEEo02MGqG-9Gb9YUW4zMCZCB-6YaSkq3x97GP8g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133572078779735903" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3928 chrome.exe 3928 chrome.exe 3832 chrome.exe 3832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3928 chrome.exe 3928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3928 wrote to memory of 4480 3928 chrome.exe 85 PID 3928 wrote to memory of 4480 3928 chrome.exe 85 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4180 3928 chrome.exe 87 PID 3928 wrote to memory of 4968 3928 chrome.exe 88 PID 3928 wrote to memory of 4968 3928 chrome.exe 88 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89 PID 3928 wrote to memory of 2156 3928 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://r.apps1.lpcr.fr/tr/op/eVnlW3Sxd_QVfDmhQxY25tR0Rdc2Hgibz-QtQNUO6IZzL1oeXuaaDO-6m6TqQannQhYPeVX1CY5TmlQRGlsDSCe8ZJie4cGLimic_ZAffz28ny1pKX-tm_HUUBKxnNayhbOpnMeVpdn6IZCT9LesVs_iRgrUSd-9FeSg8mIhuzeEEo02MGqG-9Gb9YUW4zMCZCB-6YaSkq3x97GP8g1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1ad49758,0x7fff1ad49768,0x7fff1ad497782⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1836,i,13901760991111363308,12944036135268510091,131072 /prefetch:22⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1836,i,13901760991111363308,12944036135268510091,131072 /prefetch:82⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1836,i,13901760991111363308,12944036135268510091,131072 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1836,i,13901760991111363308,12944036135268510091,131072 /prefetch:12⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1836,i,13901760991111363308,12944036135268510091,131072 /prefetch:12⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1836,i,13901760991111363308,12944036135268510091,131072 /prefetch:82⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1836,i,13901760991111363308,12944036135268510091,131072 /prefetch:82⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 --field-trial-handle=1836,i,13901760991111363308,12944036135268510091,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD52399f44c5c84187a2d19b24175a38d03
SHA101790d1ef0150ff839f2c0c81108582765884501
SHA25615e7be615c4d9d5807e62843b8cd64894456732dcc62f0da24b80f0db1486506
SHA5128f2271c80aba2bda2e3dabd753cbf6058f9ed32e52d2bdd7f2b1f2e29fec567cc242a9b9bca87cdbe276865930698c949a32effe7870ae3292467cd63a5ac336
-
Filesize
6KB
MD5a5c08b7456f36846aeda157713332b66
SHA1cd053d22f3e08c0bd08febab1f78d837067307b2
SHA256f8c4eaecbbb8140be68f39056f8ac955a7dc08e8c9cf0abb146f002a9a3478ec
SHA512bc80aff89b03500f0e829437320ec15a05384ac565b6099b76e14b2f0088c1a1c26264d1e6602237a8c3b84cb43617dce244d00f0eb5769b09cc39e7c7591055
-
Filesize
114KB
MD51c8d429ad482eea3c849014303ab2967
SHA1f0af15898f97669285c277436a720b34f6152c59
SHA256a8b95ae188b4b5ab487f84c578746dfaf831520a8ff6c61291ed8474e849d788
SHA5126c57db3583caf7b69dad40adb42a56896ea462172d1e0c3a67f0af702230e850f9ccae78d8bd9ba487e830bce4eeac637f621db8fcd7f19975db325a8fc6e69f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd