Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 14:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://security.microsoft.com/quarantine?id=fdac3997-f260-4cbe-c288-08dc608ede40\0155c466-e2b0-e5a1-dcee-97b2db7e852d&recipientAddress=%40ENC%40Enwiz0GCmyasgLDAGtIPg110BrwQxTDYl5F9WP%2BiXTSEJp20rZ93ydaCFkcEtbFT%2BmUvaF2sDGTov6thIn%2BitiW8HcN%2BlLqmJTZZ9lQtpi1ODNUGB%2FdGb3eBLNYQuRej
Resource
win10v2004-20240412-en
General
-
Target
https://security.microsoft.com/quarantine?id=fdac3997-f260-4cbe-c288-08dc608ede40\0155c466-e2b0-e5a1-dcee-97b2db7e852d&recipientAddress=%40ENC%40Enwiz0GCmyasgLDAGtIPg110BrwQxTDYl5F9WP%2BiXTSEJp20rZ93ydaCFkcEtbFT%2BmUvaF2sDGTov6thIn%2BitiW8HcN%2BlLqmJTZZ9lQtpi1ODNUGB%2FdGb3eBLNYQuRej
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133580962707284436" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 2764 chrome.exe 2764 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 4856 3948 chrome.exe 86 PID 3948 wrote to memory of 4856 3948 chrome.exe 86 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 1196 3948 chrome.exe 87 PID 3948 wrote to memory of 2664 3948 chrome.exe 88 PID 3948 wrote to memory of 2664 3948 chrome.exe 88 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89 PID 3948 wrote to memory of 1684 3948 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://security.microsoft.com/quarantine?id=fdac3997-f260-4cbe-c288-08dc608ede40\0155c466-e2b0-e5a1-dcee-97b2db7e852d&recipientAddress=%40ENC%40Enwiz0GCmyasgLDAGtIPg110BrwQxTDYl5F9WP%2BiXTSEJp20rZ93ydaCFkcEtbFT%2BmUvaF2sDGTov6thIn%2BitiW8HcN%2BlLqmJTZZ9lQtpi1ODNUGB%2FdGb3eBLNYQuRej1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8aa6bab58,0x7ff8aa6bab68,0x7ff8aa6bab782⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1732,i,1699282456511717992,13931745330397571322,131072 /prefetch:22⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1732,i,1699282456511717992,13931745330397571322,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1732,i,1699282456511717992,13931745330397571322,131072 /prefetch:82⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1732,i,1699282456511717992,13931745330397571322,131072 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1732,i,1699282456511717992,13931745330397571322,131072 /prefetch:12⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4164 --field-trial-handle=1732,i,1699282456511717992,13931745330397571322,131072 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1732,i,1699282456511717992,13931745330397571322,131072 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1732,i,1699282456511717992,13931745330397571322,131072 /prefetch:82⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=976 --field-trial-handle=1732,i,1699282456511717992,13931745330397571322,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5081902879ae02fbefe3d3ca3c7b69a14
SHA1220907d04e9e6949805dd3468d64fcb498829947
SHA256153b6e852a9560b6ad3728bcec72573378cf6f33f365634ab5ab8107153ee32f
SHA5124257ef4966006a85699a42d51abfb00993b9a0552021a6b6dcd3f96160fd53276bf240328ba01dbc02a10fe9da277cfe8362a4d185cfbd8a3a56cf382338aca2
-
Filesize
2KB
MD580ff8bf6d8a214bffe63f5ab15c53d4f
SHA19a4524a65ebfa878800c01aa006f4228bbfd2149
SHA256d0386be996db1cb1e03f2d3c35213089bd9aef3ba608b8c68615f5cac2448914
SHA5122fe98f030a90ac5accdbffcfdde794bab25bc32fd6a1c875b9d7b5575cb95504ae3f01ec6c1f76bdf2b355e1d2087743cf289e61ba48eef7d4ebc214e58d5ea6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD587480608966e14376a876493fcb416a0
SHA1b33dfa0302a48cb010c835bcfe22575a6f5a980e
SHA25695d19a4ece7933384f4dc58dfc703a7c203c8616dc994aa22f584e4c7ca24dc2
SHA512837feae2821a0500cd789e31cd3e4c05f3a3e1d6cdcd8bb4464ff8ee6faa9be4add25e3bb5b909f1b77ae5f44e94451e4ee03a2393db950cb49f143efd29f72e
-
Filesize
7KB
MD5ac07cf0b2d974ca92fc2f9241af0cacf
SHA1d3e1a78659586f74ab02e9652101efa68adedb47
SHA2569db98fd4289136a256747c18c982f3b1e9205f39510341cae3eb1e43af1a7e6c
SHA51270d13a7259bd941ba369c4de7f12c0a734e3b2b83ea640a783b785bd16f3662c80b6a4314fb761e27e2f78b288f7f5903fff0fcb5c1de032acefab3f1d59078b
-
Filesize
127KB
MD529f277c00c99d65fd56cfbe19b49e5f8
SHA1d0b3fd9044829ebd0182058e1fc3bab215c9b3b2
SHA256fed16dcf5f67867835171f82dd234a40d3ac6b8d61e4fb898f925bdf6670b7f1
SHA5121908202f99160c1398c2af39a3f2859eb9183445407baa92c739172ddae5763511a5c39a75c4579213f915707a0200ee08c0fc0d4006aa717d8290e421eb8008