Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
22s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 16:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.zheng-run.com
Resource
win10v2004-20240709-en
General
-
Target
http://www.zheng-run.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133655341222711807" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1132 chrome.exe 1132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1132 wrote to memory of 3940 1132 chrome.exe 83 PID 1132 wrote to memory of 3940 1132 chrome.exe 83 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 2476 1132 chrome.exe 84 PID 1132 wrote to memory of 3996 1132 chrome.exe 85 PID 1132 wrote to memory of 3996 1132 chrome.exe 85 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86 PID 1132 wrote to memory of 3952 1132 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.zheng-run.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa89d3cc40,0x7ffa89d3cc4c,0x7ffa89d3cc582⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,6442130678641283507,11657220032473610718,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,6442130678641283507,11657220032473610718,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,6442130678641283507,11657220032473610718,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3036,i,6442130678641283507,11657220032473610718,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3040,i,6442130678641283507,11657220032473610718,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4464,i,6442130678641283507,11657220032473610718,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3680 /prefetch:12⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4656,i,6442130678641283507,11657220032473610718,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3376,i,6442130678641283507,11657220032473610718,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:3796
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x404 0x4701⤵PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD5ddd1d7c4b4a3279a88e4195e0cf49701
SHA135e3327c64c492b4223d34d878e9719f5e3a3c8f
SHA256766bc7e5923d8dfc9e8d587cf92eb83d08be9d8f23f26b8d4b2f61c6a3d2cc0c
SHA5127a3dc53399f5fd048c836418a3f77e5ad52a4b6768027dc2bf13be08aa4121507012bc0a2bde42a2db60c22a543008770c9845b25a918263eb5cc95f766f6489
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5355836f40c962aacef1a2f4b88834e46
SHA1ae873f26a67fe8b9332f575c1a5e3a2961c3a877
SHA25674d468c9dc9a78a0cecd9f13f4bed8b5cd02a7cbf9aa096fd7d7ae54d8ce0359
SHA512a9c7b2a299d06a57f07f1877701a2b9c6620c67038c56aa8648efcb785be3e35a3079f03365257ef4e63d9ab7617f835f448b9670b6d525e1e36f38e05a08532
-
Filesize
8KB
MD5a6937fcccfc90402779996f8934a6c59
SHA18a7ec423b972098ef692406b09c3be1d5e41324a
SHA256bc4ec3826fce2d73f7ab8b62b4c560836c9982ad9774f19b43bfb1a426ee89ec
SHA512dbedf9fb7b19c2ed07742c6fb1fc68582d6c2d5bce65f69de602b55599dd8bea5b851e1aee88bc6e8994b3e8adbee6c8d6bd3700df9cac819f1f7ff7abb30283
-
Filesize
92KB
MD5ab6969c3e5113eaf8a7892fca93e8e3d
SHA193289cb935034d7eb2eeba95a66006568a76967f
SHA2563ec7711d696eeb6f44bae69d53ca0c0c1dea92e7f458c87ec1d6ab4a62ed71f6
SHA512086bc2d520d9fd4376e71cc9e1065c17354543fcc3bb7836f42c1f442ada703f5de5e838fd16d56c6ed94f475fcbc33c5945b9e8bb81e10e5a327c50ea4e7bd7