Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 05:10
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578906710085800" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1428 chrome.exe 1428 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2700 1428 chrome.exe 82 PID 1428 wrote to memory of 2700 1428 chrome.exe 82 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 2824 1428 chrome.exe 84 PID 1428 wrote to memory of 1720 1428 chrome.exe 85 PID 1428 wrote to memory of 1720 1428 chrome.exe 85 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86 PID 1428 wrote to memory of 3064 1428 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://aka.ms/AAb9ysg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e6a6ab58,0x7ff9e6a6ab68,0x7ff9e6a6ab782⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1900,i,15633590571722125002,7923065121111680523,131072 /prefetch:22⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1900,i,15633590571722125002,7923065121111680523,131072 /prefetch:82⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1900,i,15633590571722125002,7923065121111680523,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1900,i,15633590571722125002,7923065121111680523,131072 /prefetch:12⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1900,i,15633590571722125002,7923065121111680523,131072 /prefetch:12⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4136 --field-trial-handle=1900,i,15633590571722125002,7923065121111680523,131072 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1900,i,15633590571722125002,7923065121111680523,131072 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1900,i,15633590571722125002,7923065121111680523,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2788 --field-trial-handle=1900,i,15633590571722125002,7923065121111680523,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5efe26c06a4dcd7bcb695c318ecb19a84
SHA1808e427fc44d7c53460ef8de4de838a08b9a59b0
SHA256c55358d58e59015ab4b266acef12530884035d4a1761693a7fc96700dc844db6
SHA5129d2dbe781860ddbe2bf5e4e73ebdec4d9ba72a3827139cb698f29c41f036939438fd506378800cad658353b95091eb790a69bce318cd86226800cfbfd43eba7b
-
Filesize
1KB
MD5d175903a6e7966c83645012d345ca647
SHA1059e3c71af4d9b8232ad2171a71b9c6f0a883f11
SHA256fdd35f87ea2b03cd5d4945bd213aed8fdf8bc07bce5b027c53fbd95e902636e6
SHA51260ab9c678cdb6e756690c392d8f02cf4b8a7fed81be7e6781a6642426c7946c4912286dfe897366b3ff72b4151030b33c4a092c3000fceff16b48aed853d5d16
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD510d9dc790f19cb0de7a88f6f391b8d90
SHA1381e39bfab75aa51a2a1f75fb63dcbaf48c6621c
SHA25681d3b29d8b018eeb1d7e7159ce5af799fa67bd5c62bbb206208b200f175763ae
SHA512a8a7adee4d0cafc384f5bbb6400778b69bbb9dfd99d93b94bd4210a81b1c094b842115b637d1ddcb94b380bd58190caaa0c922881cfa32a53c4a197b60a2f844
-
Filesize
7KB
MD58561b6eab6fd1e9626173a9243a3e019
SHA15c22abef38457373d116328c57c79d925ea68cbb
SHA2567dfb2fd8d798405195a2a7bc7a1dce1cf6befb5df08a04c7d107eb183b5b39fa
SHA5121ba99086d4cb1e1a6ecea17c200d74ca88c06123559a876c6f1832f29a5a32b91d720c67273b208d4f72ff69f268c03ddd8e5269e3b66c782f3d1a892a4058f6
-
Filesize
250KB
MD5fbb4e512d074686b2a94637e7c4e8fbc
SHA15e68f0649f4a8377d4cd2afef4372269a288c79a
SHA256c9c84c2e5ea2d5b0c8c2399cf7f460797b5ad1ec39e4b29231322a1e17eae36a
SHA512a2cd0971a6e235464538d097e09e323ddf86f1c287c8481924b6277f4d023ac71e12651c8f4975e2bb30180e636d3e10f19551e19fcee2126ecd62b6ba11c113