Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 07:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://kemper-stadtlohn.coupahost.com/sessions/oauth_callback/inbox/preferences
Resource
win10v2004-20240412-en
General
-
Target
https://kemper-stadtlohn.coupahost.com/sessions/oauth_callback/inbox/preferences
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133583312024409421" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1900 chrome.exe 1900 chrome.exe 4428 chrome.exe 4428 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1900 chrome.exe 1900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4848 1900 chrome.exe 90 PID 1900 wrote to memory of 4848 1900 chrome.exe 90 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 4260 1900 chrome.exe 91 PID 1900 wrote to memory of 644 1900 chrome.exe 92 PID 1900 wrote to memory of 644 1900 chrome.exe 92 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93 PID 1900 wrote to memory of 3528 1900 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://kemper-stadtlohn.coupahost.com/sessions/oauth_callback/inbox/preferences1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd41ecab58,0x7ffd41ecab68,0x7ffd41ecab782⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1912,i,1113114779426710427,4283365174057499006,131072 /prefetch:22⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1912,i,1113114779426710427,4283365174057499006,131072 /prefetch:82⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1912,i,1113114779426710427,4283365174057499006,131072 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1912,i,1113114779426710427,4283365174057499006,131072 /prefetch:12⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1912,i,1113114779426710427,4283365174057499006,131072 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1912,i,1113114779426710427,4283365174057499006,131072 /prefetch:82⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4532 --field-trial-handle=1912,i,1113114779426710427,4283365174057499006,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1912,i,1113114779426710427,4283365174057499006,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD558d2686e817a4c9249ad511cacfa9091
SHA14f137f8ba3a35b2fd2e1646a1aa476049f6c5d91
SHA256a7d653332b25b7e386f3cf32080bb8c5e8e1bf9f3329cf794d7189f353093261
SHA512842a316b1c91bf621d7ccb1ec2189839b9b5e972e42fef0c34b48d2292de4c96ef272fb69cb88439dca2c05157056c702cd69ebcb439fac5e6ebcbd4d763001c
-
Filesize
1KB
MD5e8479e8e0215a77b5610114e95c5ae4e
SHA1db7bd51719c1c1fe6b18489b2ba9535b8b85adcb
SHA25673aa8d317609c7e2760b33de5e70af7e89837f5918caa868eeb0670c1362d42b
SHA5123362606243396fe8de99634e5ffba921aa99f7686dd8a41fff682dd6907598e660d736d00291f53b332f86fbd0f82d43f551572a67a90d39a2e109cf773a0c11
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD549d21cb9054207519425d900ae6ccc53
SHA14833463bde7c759e20e08df35ff4d1f711cc8895
SHA2567cc25576c0a9aba666ec71f4f0fcbb479696f808cff74d03a5dfaeba000ac9e2
SHA512cb4555a8f89102c37b24f26dcca92aabf3e942c311c5369000dbd551d9b2650410535a671b6ee4cefda6fed27dd074238ba9582b76d3b7a54ece3eee87a4cf7c
-
Filesize
7KB
MD5913349253c87778f45eed36bd72bc0ef
SHA1f12cc79ba03944b5628d7609cac48346f5828380
SHA25665a4a6403b108129a2aff1851a88c3dfce1984a719dd870d468c7c1aa48651f4
SHA512627bc60e146a6af24254eb661f696240e8fdfdfe0489d422dfdfaab14b678fc5f639276e316bcb2852be19208f0c3d356abc4021edb045260e844fed0c28c87d
-
Filesize
250KB
MD5f1bf309f8bc483d07ae365c2042d9174
SHA1b50347bb103f1b0c4df6a826c3a3b5319c8a362f
SHA2569bf1a8e1c78f933840a6b601d2c975f2ff78ef6902b00bdec68ebd5b6aae2a5e
SHA512db9d03e48774a1c65fce7db366e86b428d3f949847fa38d97e7705f7a767896303c3f45a8895919d3210cb28f52f1e17f282482e07f940e2bc8f5ed3e14d9f2e