Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 06:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://dublincore.org/schemas/xmls/qdc/2003/04/02/dc.xsd
Resource
win10v2004-20240412-en
General
-
Target
http://dublincore.org/schemas/xmls/qdc/2003/04/02/dc.xsd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576360609936608" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 848 chrome.exe 848 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1760 3032 chrome.exe 86 PID 3032 wrote to memory of 1760 3032 chrome.exe 86 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 2012 3032 chrome.exe 87 PID 3032 wrote to memory of 1004 3032 chrome.exe 88 PID 3032 wrote to memory of 1004 3032 chrome.exe 88 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89 PID 3032 wrote to memory of 2580 3032 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://dublincore.org/schemas/xmls/qdc/2003/04/02/dc.xsd1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c869ab58,0x7ff9c869ab68,0x7ff9c869ab782⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1856,i,13381919379615783527,3285529339603246052,131072 /prefetch:22⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1856,i,13381919379615783527,3285529339603246052,131072 /prefetch:82⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1856,i,13381919379615783527,3285529339603246052,131072 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1856,i,13381919379615783527,3285529339603246052,131072 /prefetch:12⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1856,i,13381919379615783527,3285529339603246052,131072 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4316 --field-trial-handle=1856,i,13381919379615783527,3285529339603246052,131072 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1856,i,13381919379615783527,3285529339603246052,131072 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=728 --field-trial-handle=1856,i,13381919379615783527,3285529339603246052,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e64250d24d8ff381498318f70f520b8d
SHA19661644e9d3fb2f6451d95f4e88cefe1db9725d4
SHA2564a1e57b91e2120dba52b1f28ce355375e1846c627978805f43311141253f1e71
SHA51267d94927e3ce7f9543ccf837d055681df3565c579dd9b2199aa295ac389e2c1520afedb2e1169085d4584cc6f8cd57339010fd8c5dbb43c0edf6d245b35d288f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5c5824f1f9f78fe0a9c4f474d765f11ac
SHA1ead0f81aa0575749aa6fc029af78708831ed36fd
SHA2564107fa4d87ce71b3071286263622c91a6e695d93149c0bc257f9cf2594093b4b
SHA51275d00f8cdd4f687184e6090e31cbeed4c0ee89a2ccda035d58a1ac9bdfdeb5105a822d30afdac22ae9cbea402e4fec9ab3ea173c93d0016251e555cf009cf212
-
Filesize
7KB
MD58d6f66bf4056b00aad8179a2a77e28fb
SHA1ed3d246f5d7c7a795fa6f9da71580bdf5b2a37e8
SHA2566e1eaba5b451da8cfdb05d3de8db99fdc46f3edd81e0cb241ccac28fb963382f
SHA512a3fc2135c75910d032026cc81018aa470edf4235e51e60352e8a8fba8e7f7b29b0db23363f0114953b2a8495320009d5afa89f28074aa11d9b62d46215194195
-
Filesize
127KB
MD5c8b9ae60b96284b3ffacbe1574b9d076
SHA19361cdf36ec11428668eab09d8871a3e7dd00651
SHA25664726fa45d1cf98504cc8777b611c404ac2ae0009cb77ecc10ca636e13999875
SHA51214fda278b89b4f7cae8f76a844f32eb4516d9fa9740ae2860b34392ae68cb57cf34804b2f131e979bb7d48b1521e5a5b82d610c7ab57c9244d270d8a0f4020e5