Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 12:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docsend.com/view/gqmfdfyctpnjmz78
Resource
win10v2004-20240419-en
General
-
Target
https://docsend.com/view/gqmfdfyctpnjmz78
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133595577871319135" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1552 chrome.exe 1552 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe Token: SeShutdownPrivilege 1552 chrome.exe Token: SeCreatePagefilePrivilege 1552 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe 1552 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1376 1552 chrome.exe 84 PID 1552 wrote to memory of 1376 1552 chrome.exe 84 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1644 1552 chrome.exe 85 PID 1552 wrote to memory of 1408 1552 chrome.exe 86 PID 1552 wrote to memory of 1408 1552 chrome.exe 86 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87 PID 1552 wrote to memory of 2668 1552 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docsend.com/view/gqmfdfyctpnjmz781⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffed997cc40,0x7ffed997cc4c,0x7ffed997cc582⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,9205193447851895930,598672277659593237,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2080,i,9205193447851895930,598672277659593237,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2196 /prefetch:32⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,9205193447851895930,598672277659593237,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,9205193447851895930,598672277659593237,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,9205193447851895930,598672277659593237,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4600,i,9205193447851895930,598672277659593237,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=5004,i,9205193447851895930,598672277659593237,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3292,i,9205193447851895930,598672277659593237,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5116,i,9205193447851895930,598672277659593237,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5260d7ca41a7d445af8f6d8651f28089d
SHA1184a8b049cefd78c31ce2fbc0b740bb9ad52a0c3
SHA25605f4da4f7ffc66b4d1775691ac0ec40c95149f40e9bf472016ea875819dbfedc
SHA512611d802553a47da6133f583c119698b2624f64c324a857f4481c4e036cad6c030249c72f6b42590cf1e5693d43ac909b7e9f1dced909afbca1157d4e3fc1fdde
-
Filesize
1KB
MD559284de962a6e2553ded75b2fd3e5159
SHA1927311b715c67ce273155160c3fcba2220b91457
SHA256c6fe1f45cc653934a2ea4f00df5c84284d8e14587d87c57029d8fb73c96360bd
SHA512d6363ffb64ca3b5342f06b776aef5e69a39162a2ebd1818816ab5b2d24dc2255ea79c2c0ebf7d015887e4d61ff051f2b120509b3df2ada129410aefa9ff0ff97
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5e47ebcccc68ba1748017164fae2a5910
SHA1b57101500ce8d4cec1e340a24ef7b9f2598f26aa
SHA2565ad952071326170fd7f5f8f8c89fdc2871940ed291995a28d3b1729f3104d3ae
SHA51266f62009433d6e45b2b5f606175283e77df945f1facc8a963363715ee029192088fb4558a7b81f88c0e5ee364561d3b7c1578f0471ff442e71f176450e93ced6
-
Filesize
8KB
MD5f788080641e92755fc8478556a14d9b3
SHA105c69e17eaff52b769be0068e3af11c787a04214
SHA2563102c31e9c7b0e611b68b40d95370d209a1fa8df915bf757a900ea114e6b3b06
SHA5128f379dd6288791af159fa900dd39a2814dec2209163648001b60302c66272b8de171b5346465f35b165df2680f25402e136527d6c09fc73d9fb31aee709480e3
-
Filesize
9KB
MD50c487199b7e7e4561b1fcef204e55fb0
SHA1ded74af31c7b1e3bb947f930c3c0671cedc33904
SHA2569a2f699989c30bea142a28f051cc43de4c1f1d9485ab674c468087118daa1f17
SHA5125a867d8286dd8e8878d55ecc3a162cde41dfb5bc7ac5cd698b45852dc67ed26e97d5c83fcf747a07eb80e8cd855b17095941e36372c17005d152f57e300a1e28
-
Filesize
9KB
MD51a645b1a94bff203996b9a82b0cf7b35
SHA1c41205bd4749ad08f2cd877746c3c89a4ae1f818
SHA256d315e47265a943aad34869c31816336740fdde58bc4f9f75f865c840183f7c2e
SHA5129570a6b07e287512ed4d11e53796474ea576a51855e5add551612c12fe0d371a864533cfdcb3297b388ff3844c31d34ddb050b9caeec75e8ecd629d4c0fc8902
-
Filesize
9KB
MD5e6b75f96ba3024b729f8a3fdaabcc841
SHA1659cf6c2c70d91950e403278ffda1f70bfda3459
SHA256cfef2d5d920bef91d64901a282392b5cefc7de148cbb7c1e4d481c369aa7b78f
SHA51245bd48cc0f66db9dc8ff6b05b5cfa94e163422a5441ab01d525e8feacdde586d6f997e9222acea3cd33dd91c69c5810f905d84cb66ba94eac4123331bf9003e9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\cd926a9a-b24c-429e-801c-e8669e73ae94.tmp
Filesize9KB
MD579c1b3ec46b45c55f5f8570086f5ee04
SHA17bf32077b42bc4058f2728342ca84d137d3429a8
SHA25608c7c655fd512756a3abbbfe811d4315ebe90b767adfaf2d5aed823b58a34dcc
SHA5121b94fa409ce470577d65199e11b24d64bf769b5d047036f8eeed7c94c6f9dd6bbe8f01c1f83b80f974b55426648f47b78e8998b0730683c12ff79d142cd61660
-
Filesize
77KB
MD5f46ab959f0cdbc894761c0729265a772
SHA1fe7a9dc75bb8223b691c070b4bfae6d145ab61f6
SHA2568e00e4937ce1a4a579e7246c34fce01ba1320ac3e45ae87db11fdd4ac9f6c40d
SHA512b07028959ff15d086b0489e56f1406ba556868f30ce83326c8973703e1f3df19dac8994d70362fd3d261114421f78570c643e138d19989e40f8a31774d67318a
-
Filesize
77KB
MD5a5b9e5fe90fb6c0b62408d120168b65d
SHA1fd5a2a01ab3b78d443d613f04dd9c4633d99c190
SHA256e41db3b695b62d5e1650f577fc5816ee3b9c6173577eba4f51ff95448e059238
SHA512c6b81512d6766ef020334bef8749f33dd0088e379881dc1dcc84fcf0322c57429b6b44111f830d20756d084adcf4ebc04e08fd17ba40ed59cbb527c0967b6d2d