Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 14:02
Static task
static1
URLScan task
urlscan1
General
-
Target
http://[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607737700765145" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 4528 chrome.exe 4528 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 3744 4632 chrome.exe 85 PID 4632 wrote to memory of 3744 4632 chrome.exe 85 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 388 4632 chrome.exe 89 PID 4632 wrote to memory of 3232 4632 chrome.exe 90 PID 4632 wrote to memory of 3232 4632 chrome.exe 90 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91 PID 4632 wrote to memory of 728 4632 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a3dab58,0x7ffe5a3dab68,0x7ffe5a3dab782⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1952,i,3846438613741942113,13869865506114294010,131072 /prefetch:22⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1952,i,3846438613741942113,13869865506114294010,131072 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1952,i,3846438613741942113,13869865506114294010,131072 /prefetch:82⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1952,i,3846438613741942113,13869865506114294010,131072 /prefetch:12⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1952,i,3846438613741942113,13869865506114294010,131072 /prefetch:12⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4332 --field-trial-handle=1952,i,3846438613741942113,13869865506114294010,131072 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4508 --field-trial-handle=1952,i,3846438613741942113,13869865506114294010,131072 /prefetch:12⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1952,i,3846438613741942113,13869865506114294010,131072 /prefetch:82⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3436 --field-trial-handle=1952,i,3846438613741942113,13869865506114294010,131072 /prefetch:82⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1556 --field-trial-handle=1952,i,3846438613741942113,13869865506114294010,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD541785febb3bce5997812ab812909e7db
SHA1c2dae6cfbf5e28bb34562db75601fadd1f67eacb
SHA256696a298fa617f26115168d70442c29f2d854f595497ea2034124a7e27b036483
SHA512b82cfd843b13487c79dc5c7f07c84a236cf2065d69c9e0a79d36ac1afc78fa04fba30c31903f48d1d2d44f17fb951002e90fb4e92b9eae7677dbb6f023e68919
-
Filesize
672B
MD51591df146ee2efdf2b7d7462d14bbe36
SHA1b2c4afda8560bdcdfe7b8e3aa2134bff4734d3c3
SHA2565b5f4a3c327fd5e1df77dadf2d881e4d5a75bc18d8d108c4d4b4b2755952ac87
SHA5128fd236c95f92e84f2baea0bc9ebe2ed7af8a2dc8242f31069aa3e1e5f0b33a7de43f69c6d06ec156cc1b1bdcda3b291b471b7d9a6a2522e22ba12e5024b41a17
-
Filesize
5KB
MD5e119118d0e0dd768c7df444b4777c2dd
SHA174906337cc290db54b7dcce54ad63853ef997581
SHA25691fd6244d5311ba271c8a93aab9c6239cd748457ad05558d7c179ac1ec7c5430
SHA5126fb0a18f9b03c459120e1943d054fecdb6c616907848693971841208b2a2b968633fb05442eea8d9d6a32c83ba9d47d8266c230b9d9d26dfbdf1666734d82ee9
-
Filesize
5KB
MD5f22b3089f20d49c2b790b8aafc741814
SHA1f764533966a571e167fd01c7ebb6e05052d6233d
SHA256ad9a5b8de24c1e006434b21bdca20bb749a3e9e824a72a10dc36b2c0acb31f89
SHA512e6a56cb6fe5fdca5a14ecf520dc81f69571e30d764e13277a218f94a8488cb1718c847a92e9ceeb4d2b08116284ec801bbddd10b9f851635214b7fad5f962409
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5dec7a55dd93e4090ef956b5459cbba1f
SHA105c49f285425f2393e260e9a1489b0e88560b75a
SHA2567c2889b0c208149d6585a0c7f70fd54fface236d55c80475aaa4c1879b1832bd
SHA5128c73647d5977e502ce43f6db7cddb588e6d1a481c8c71806bbfd3e4ad6bed2ff3319fdc6b186a52d826d84a3d9c79f312b8da31fe2d96382fb0b1898427f665d
-
Filesize
7KB
MD520c88b54f9e551b757ef08f57a90664a
SHA11afaca38665eb5c93af2e67fc82dd17ed25884b4
SHA25642d3043d29d29bd91d363dba6a62db6084c428f9f868de8cb420e739b64eb6c6
SHA512ca0a04ed8d37985407b91db6920aa2c84386ef4dd7623f89d85b1804f90d6524afa4ac3f9a1269900fac1840e6d3497d31c56ddf3dacfccb856ebaa465af56f1
-
Filesize
130KB
MD5973541011e85944e1f1c5508e32f6f26
SHA1c1d70ee17bce9feda2e5bb852f9749df82eadcb4
SHA256642f89a987f75cda26820479b82141ce1159ca8db4730ddda5a00d29fc88475e
SHA512dafd025e63e8eb6bd3f367a77c5163f59d9c215e21a13425a03232cf8d3ea635a7dbe45e627805aaa8a93d0cee4a03bb03614130f811e4d5115125d1750085c9