Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
19/04/2024, 15:29
240419-sw4ecsgg4t 519/04/2024, 15:20
240419-sqvv2age7x 119/04/2024, 15:18
240419-sp43baff44 7Analysis
-
max time kernel
40s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 15:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chromewebstore.google.com/detail/save-turtle-tab/cjbclahodcgffgpcdokophcaeahpjddj
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
https://chromewebstore.google.com/detail/save-turtle-tab/cjbclahodcgffgpcdokophcaeahpjddj
Resource
win11-20240412-en
General
-
Target
https://chromewebstore.google.com/detail/save-turtle-tab/cjbclahodcgffgpcdokophcaeahpjddj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133580135721411807" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1720 chrome.exe 1720 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1568 1720 chrome.exe 86 PID 1720 wrote to memory of 1568 1720 chrome.exe 86 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 884 1720 chrome.exe 87 PID 1720 wrote to memory of 4772 1720 chrome.exe 88 PID 1720 wrote to memory of 4772 1720 chrome.exe 88 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89 PID 1720 wrote to memory of 4216 1720 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chromewebstore.google.com/detail/save-turtle-tab/cjbclahodcgffgpcdokophcaeahpjddj1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9015ab58,0x7ffe9015ab68,0x7ffe9015ab782⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:22⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2148 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:12⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:12⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4244 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:12⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4432 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4456 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4616 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3348 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3076 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD5d5ea9c7f9b6f21f5ee6c58b878915b80
SHA1a11f7e831ed1561ec2907a4697c9325324b620da
SHA256b5cd2bfd4697a04e2cea7cee0c4180f401d3d04e16d1da995b8bbbb745b4a851
SHA5128a784f01a19c3b092e351fd1a700b7e7bc33530fe943442fdbcca11bab9310cdb1f4ec0b06f947b25168ecdae381aa029d8a3d946961b2ed642f08fe23e7d7d9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD5e9afa4a1a1a1a9320f9edd271eabd487
SHA16901333be7dfea4fdf86084cf2c3a25359acfe1d
SHA2569e58cb4643084d9637bc94d2fe88d3d314468e96e2b43df5b1e4feff484706b3
SHA5120172bd6f270ca380d70b4d0dbc0bec3b28d45cda8bcb34e04df23dd4a70d6252300996567b786b456e08ab5c3333b094cc32f36a3d8f0f0b4e626594b939514a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ed0c06f2-5255-45f7-b9cf-653e31d65f32.tmp
Filesize7KB
MD51ca97baea418c876b5b84da4213d6cbd
SHA16b2822bb7e67478c65e94f625a2ab5e31fc842d3
SHA2562722507963db9a851be66e8bc21099b1d92a37f9d80d2ba927ea4833f2258dd1
SHA512345f0319e916a7936afaef173fdb2809188a50849765b782ae03629234bf5a4644cff535c77af6c80ce4d075a18d9d23166b79d95a02bd51d1dff848f9c15d3a
-
Filesize
127KB
MD5579d3ff3b12f635d5987bde6ed6a3a31
SHA145ae90528654e9946b2b90c32fca07095bb68655
SHA25600b5c924aa517fc564e7a98eedfdc853964e5d4490e1fcef6ef41d5fa5d76326
SHA5125b586b378ffc3a4700b8d15bee2588240c6392746ef8ac7a952bc3a166c79b9467c16f00b71b5c20dc4069b77305130b8ff58489bdf7a634eba43085e7f7d1b7