Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
54s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/04/2024, 14:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ocsp.dcocsp.cn
Resource
win11-20240412-en
General
-
Target
http://ocsp.dcocsp.cn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133585280290186268" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 832 chrome.exe 832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 832 chrome.exe 832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 832 wrote to memory of 1696 832 chrome.exe 81 PID 832 wrote to memory of 1696 832 chrome.exe 81 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 972 832 chrome.exe 82 PID 832 wrote to memory of 5108 832 chrome.exe 83 PID 832 wrote to memory of 5108 832 chrome.exe 83 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84 PID 832 wrote to memory of 2572 832 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ocsp.dcocsp.cn1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd08d5ab58,0x7ffd08d5ab68,0x7ffd08d5ab782⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1784,i,8662637829540376371,8727390173402601903,131072 /prefetch:22⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1784,i,8662637829540376371,8727390173402601903,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2164 --field-trial-handle=1784,i,8662637829540376371,8727390173402601903,131072 /prefetch:82⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1784,i,8662637829540376371,8727390173402601903,131072 /prefetch:12⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1784,i,8662637829540376371,8727390173402601903,131072 /prefetch:12⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4228 --field-trial-handle=1784,i,8662637829540376371,8727390173402601903,131072 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4224 --field-trial-handle=1784,i,8662637829540376371,8727390173402601903,131072 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5ccb99a7924e9c615384eb05bebc88522
SHA12a3008aac24ad0423655aa6cdfa1950d5406b957
SHA25624c67adebd76a00f26026cd12f5ae0692811fffa97a21e6999467d77dc037ca1
SHA512c1f475eee52d14721c111520cd8ed8a46cf4421c929499f42e929e78737485e3eeb1effd41bef88dcef91f7107175968d65f7d05f8882b15dfdb688addd28c95
-
Filesize
127KB
MD5978a042fffe5a17c7b5bfbb23ba4749e
SHA1db07d6b4624dc8cd3fd4818119949c27abd3d037
SHA256aebe148556a824ae0a8ee678406306e04b108d536601e9bb7a894bcd56b38f1b
SHA5122de348a0900f8d7feceb83ef5efc52ea894403819bb7c2300a39f9bc518bd34854c5d472a538fe3c0e898f0184d71ae53c71d2b9349d02f9616148c67312983a