Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/05/2024, 15:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.forsyth.k12.ga.us/sfhs/wareagleexpress
Resource
win11-20240508-en
General
-
Target
https://www.forsyth.k12.ga.us/sfhs/wareagleexpress
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600867939964173" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 952 chrome.exe 952 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 952 wrote to memory of 2440 952 chrome.exe 80 PID 952 wrote to memory of 2440 952 chrome.exe 80 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 4584 952 chrome.exe 82 PID 952 wrote to memory of 2236 952 chrome.exe 83 PID 952 wrote to memory of 2236 952 chrome.exe 83 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84 PID 952 wrote to memory of 5048 952 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.forsyth.k12.ga.us/sfhs/wareagleexpress1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb6178ab58,0x7ffb6178ab68,0x7ffb6178ab782⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1512 --field-trial-handle=1456,i,8803086006258458954,821903963083619903,131072 /prefetch:22⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1456,i,8803086006258458954,821903963083619903,131072 /prefetch:82⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2136 --field-trial-handle=1456,i,8803086006258458954,821903963083619903,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1456,i,8803086006258458954,821903963083619903,131072 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1456,i,8803086006258458954,821903963083619903,131072 /prefetch:12⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4076 --field-trial-handle=1456,i,8803086006258458954,821903963083619903,131072 /prefetch:12⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4188 --field-trial-handle=1456,i,8803086006258458954,821903963083619903,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1456,i,8803086006258458954,821903963083619903,131072 /prefetch:82⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4248 --field-trial-handle=1456,i,8803086006258458954,821903963083619903,131072 /prefetch:82⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3672 --field-trial-handle=1456,i,8803086006258458954,821903963083619903,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD5585ac11a4e8628c13c32de68f89f98d6
SHA1bcea01f9deb8d6711088cb5c344ebd57997839db
SHA256d692f27c385520c3b4078c35d78cdf154c424d09421dece6de73708659c7e2a6
SHA51276d2ed3f41df567fe4d04060d9871684244764fc59b81cd574a521bb013a6d61955a6aedf390a1701e3bfc24f82d92fd062ca9e461086f762a3087c142211c19
-
Filesize
648B
MD572b3aa558e18b82216c7f58a7aed361f
SHA135660f4a99abf7373480b2880318adf1ada65704
SHA256213706f31a4b8dc9014436baf092101b3d06a2658d2f2ffd12f59d9788d0a9d0
SHA512cac5c5c916fa3ac3a325bd95a383802d6b986a55fdf326a1b4d4fef9be60654f5fbe17bde13e9bc3563b7e47ae8788797c346e8b561a63c990da526444452a9a
-
Filesize
4KB
MD5a874758e581925329e3dff1734d64f13
SHA1f451e8be9992a0d0000e9c6870a17400a16fee21
SHA256d18eb56115257f9fb8fe6e21ecb16c4e936ed8e9e772a751eafb9d2839147b84
SHA51212d66cab4a232923579d0960a6540e3034985d5cb4c2214834e9404216a0b1f0b5b917411c1e2ae73f414aaa258664895db9b87f000c822ab1ee21e6fcd9ab9c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5aeea6094b79db7e2c2a83d5f8c3860a5
SHA1fda49f2d2f1732f9182cc7b144ca1e6d89ce22c3
SHA256d0a7aa34f95bdbcd5a38b8b7a08fbd8a8d776dafc268c566b49ff88fdbfda5a3
SHA512575857c221a2c752440a66ba2fcff9e13e063ec5f3868c420ee350d9d6cdf61a1d9ac21338754fc5726139de4bde8514bfacea3fb5c1631f1866289bc17fd248
-
Filesize
1KB
MD5b6af7352a483ed74e51f220192f5bd58
SHA1fe1f93012a6ed626b08b10830f5d6fe987be6558
SHA25652e67baf8ae6ea82ca29e043eb874e14f1e54808df1b28ca2c39cdb195419538
SHA5121ec6f3d6cd1ebdddad51f8ad4fef176916d36ce94946f85a3a92865149434ead78aed1092a1d408517c3438902f7b742b00608fc1399773c2c063d5938374b3e
-
Filesize
1KB
MD5f1d3cf6a99a9e5bcda425a922332f517
SHA131f096422236528d21535f4f24063a0d65517614
SHA256e7e3d95e166246f22daec6c0dbb1c4c91d51e15e15e91ddf78b3225abac61ccb
SHA512da13cd7340b9e90737b560054b3a43651d4feac6324bb8e432d6fac51ff17fc6c8cf48e426739c9aa32cd703933c225f44e0b855aa66204c0b4e4202e9bd115d
-
Filesize
1KB
MD54f793adc6f917d1792e7ef72912af8db
SHA1658e4bd2f37649aa3d3009546b8b6ae0cc4ffe40
SHA256327c0f164f88f9881b690e46dc079cfca4f8ad3e685c06d97e526e1a2ec326d8
SHA512b7448da2235b66d1f591a5e681e959eda16cc9785a1710bf1a6ec01d7b0e8ad28e4201d00e9af27df72d84ed0d1624ed02740e8080253216065ffcbe41d36f1e
-
Filesize
1KB
MD52772dabd329fa015bbe0dfccfc151620
SHA1fb3259b3b69d101d2cf95d53e704335d02acba40
SHA256aec928f8fccc513de66e69c75b5038dbc65c2144aacb132dd4614eef3fd50cd9
SHA5123832a0f5ace64524e7a0893e48ee55d76f5cf1448b4afe8cda38fade55e7e38a8ab1ceb77dc139c6bd55490122acfe028b557b5f60bb3cc2d2cf2e31831be326
-
Filesize
7KB
MD5563fe07d140913fe771f6b6c0bb2a28f
SHA1da53ced16cd28823011595acf5465e2f9b4a2d2c
SHA25693a30e5be286a6169f00764bb2ed18d3c9a38ce50e82fd22cfeaf9553786e621
SHA512d4fd557291d56af4807956832ae39b90ec541d8c9b0a6343f7067e8b4b6cb745dc5d3c1441c9c82ce200d02e8e2959e0bcde21f123b23d194b9910d66a2cf7ba
-
Filesize
130KB
MD5a9e991fceb69a05e0339b21b4c4d142d
SHA1b4e2dbb6ccde67a71b770b4093c0a542cb16ed8b
SHA256be920a7fce36983d592505b5ee578b496fb3f0320c7da6e64e9c8c18466d655d
SHA512c2cb799a07fef0c8b3c0df70e01a3a7734e7ea27d6a941f9f52dd34124102b0d7df554bcdd543ea99bd2ae3add3efbd40dd7512fa3cb85c96f383b8ec647f759