Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 01:53
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2539840389-1261165778-1087677076-1000\{524CD823-0F10-4AC5-9E9F-77FC7324C396} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5112 chrome.exe 5112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3548 5112 chrome.exe 82 PID 5112 wrote to memory of 3548 5112 chrome.exe 82 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 384 5112 chrome.exe 83 PID 5112 wrote to memory of 1540 5112 chrome.exe 84 PID 5112 wrote to memory of 1540 5112 chrome.exe 84 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85 PID 5112 wrote to memory of 3924 5112 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wbmmachine.en.alibaba.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b3c7ab58,0x7ff9b3c7ab68,0x7ff9b3c7ab782⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1916,i,2205733753177663433,14230441397518053873,131072 /prefetch:22⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1916,i,2205733753177663433,14230441397518053873,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1916,i,2205733753177663433,14230441397518053873,131072 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1916,i,2205733753177663433,14230441397518053873,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1916,i,2205733753177663433,14230441397518053873,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4296 --field-trial-handle=1916,i,2205733753177663433,14230441397518053873,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4436 --field-trial-handle=1916,i,2205733753177663433,14230441397518053873,131072 /prefetch:12⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4280 --field-trial-handle=1916,i,2205733753177663433,14230441397518053873,131072 /prefetch:12⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2964 --field-trial-handle=1916,i,2205733753177663433,14230441397518053873,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4196 --field-trial-handle=1916,i,2205733753177663433,14230441397518053873,131072 /prefetch:82⤵
- Modifies registry class
PID:4936
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4420
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x3101⤵PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5eb94775cefb5fc946279c488cadbb886
SHA195c2f8021f1f24c72a278de6f252a7ccc4a751af
SHA256729d34a998b5d499b66e55daa54d5f7e64d2256ea1d343a70b781b56227f7f72
SHA512bd4696287e1fcf5efe2348e08636a2e0f7e3535240a72ab1c8b091b37b3ad9d3f6bef02054db7ea39e4a92f4a29fca236619a9d0bb37390168c8b5a3294b1707
-
Filesize
23KB
MD59a831e3c61d6bc70cbc0d2a709f8661b
SHA169f1fe5c98045c242b7865f1f7a2374be543ac48
SHA25665849eb5b33d2b0b1bed1976f47b06ca4363836b920b63fd7107b2b691fe2598
SHA512ed9a57f161668c2456965568f6bd18fd4399e211a4415ef71d3e4275d9d87c1e8736c5bf72cb53b8e5a1cf7d8f77d79c136b33baf66e9e6b57a47c08f0ded79f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
257KB
MD5de562404f2e2b0a8842c9bd45b6cd1c7
SHA10f756d7353da969321bb5e49da728681fc19255b
SHA256c24a1634101fd53ababeeb8bf7ad0ce0c7d115d565c0661a0bf096b24ea7ef31
SHA512fcd6bbe337759a4d79c52431078545701e9068db2ba8bf06d825ecacf71568d7ee89939328579a595db8ed7122d90c00e3af8fabac0cab7fcb2545af2984ce2c
-
Filesize
109KB
MD54b9fe2028deeecac1619cd810cae6801
SHA1a03d7ec67d549ca3f792dd7fbe7e5f95c86c56f2
SHA2564d31ac0ed44149fa4c3b990166e1a07f6b1cc3609df6738727fc0986828e1cfe
SHA512f376e007e6f9138b7849dc53ae9ec66d893a69aa19494c2819b683d59227d38d55af65f0626d2227ad652dfdca470d83a56e4c6cf7613eac4f065818830ffc11