Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
404s -
max time network
403s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 09:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://aqua-hollow-alpaca-520.mypinata.cloud/ipfs/QmdPmF9EuogwY5F2VHbYXG6eke8hYBvBc5p5rXQtvg1WtM
Resource
win10v2004-20240611-en
General
-
Target
https://aqua-hollow-alpaca-520.mypinata.cloud/ipfs/QmdPmF9EuogwY5F2VHbYXG6eke8hYBvBc5p5rXQtvg1WtM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133636953554979767" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4352 chrome.exe 4352 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4292 wrote to memory of 4476 4292 chrome.exe 83 PID 4292 wrote to memory of 4476 4292 chrome.exe 83 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 2336 4292 chrome.exe 84 PID 4292 wrote to memory of 4944 4292 chrome.exe 85 PID 4292 wrote to memory of 4944 4292 chrome.exe 85 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86 PID 4292 wrote to memory of 3736 4292 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://aqua-hollow-alpaca-520.mypinata.cloud/ipfs/QmdPmF9EuogwY5F2VHbYXG6eke8hYBvBc5p5rXQtvg1WtM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffeba8aab58,0x7ffeba8aab68,0x7ffeba8aab782⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1856,i,7199810962652785658,2771147172009890797,131072 /prefetch:22⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1856,i,7199810962652785658,2771147172009890797,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1856,i,7199810962652785658,2771147172009890797,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1856,i,7199810962652785658,2771147172009890797,131072 /prefetch:12⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1856,i,7199810962652785658,2771147172009890797,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4300 --field-trial-handle=1856,i,7199810962652785658,2771147172009890797,131072 /prefetch:12⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4508 --field-trial-handle=1856,i,7199810962652785658,2771147172009890797,131072 /prefetch:12⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1856,i,7199810962652785658,2771147172009890797,131072 /prefetch:82⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1856,i,7199810962652785658,2771147172009890797,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1856,i,7199810962652785658,2771147172009890797,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD501bdbd8f3780fb4c7904bef7ebf3a294
SHA1a92b25af3651bb54705c1d719b9b5080d02c6e3c
SHA2564c527582e6bad6504ac047a6c9c41ccbd2c2b51b5e2ec825f5ffa857252b24f3
SHA5126ca098f446d3e16bca3e605f175b093344587665de0612f26af620fbaba452528c55f0c5ce942ba2bf845681ac93edd5f0c85f666938e8602c0fd0509adbac3f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
521B
MD5efbfdf142ab19ffb97c841687aa9e5dc
SHA1afc4b6e52de6657f6cf553ad9e61d705cb154d41
SHA256425e79ca8215f273d8d9ea2951a541702d918293a8b5e3de954e00ab8c8b500e
SHA51247be868e05f6f9be93627c9e1cee1453243e7d33720922c1422b04427e5cf501d032a00e8275671b7ce3ccb489f76a164d0c3754002267697c54f70d3f07203c
-
Filesize
7KB
MD585d11f50a0151c685b51b6fd13a3504b
SHA1cb1fbe5dedaddf8b22ed3e1c16fd43ec6fca2bae
SHA2566c36cf2615997265d89cac89fec3e47df19f248a265e22ff3034ef3977ece938
SHA51269c9d74fea24da75edc1851d27aa7bfbe07c15910320e8a5fa6b58cc74c7ba3d1d5947880b81654f410905a8c77378f285e36c9656902298004f01c3777c0ead
-
Filesize
138KB
MD5c3c0622d84b55ca11989e66e409e980e
SHA1a9a5513873d52ab6cc643fa40b6e4c8c747f0883
SHA2567b71e3948c6744c9afd77e4d91474f33ce10d28749bb0ebb1a0a302ffa8ef1be
SHA512e1646e58ffb81c542d5c6a197e993289d1de32a16a6be3893f8deb8e22aa38574af4bfd90cb90e112c6f47cf8fb7ea989837ab23a56125542de3c92029edd782