Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
526s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22/07/2024, 08:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/search?client=opera-gx&q=google&sourceid=opera&ie=UTF-8&oe=UTF-8
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
https://www.google.com/search?client=opera-gx&q=google&sourceid=opera&ie=UTF-8&oe=UTF-8
Resource
win10-20240404-en
General
-
Target
https://www.google.com/search?client=opera-gx&q=google&sourceid=opera&ie=UTF-8&oe=UTF-8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133661107609889451" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3296 wrote to memory of 1116 3296 chrome.exe 75 PID 3296 wrote to memory of 1116 3296 chrome.exe 75 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 3152 3296 chrome.exe 77 PID 3296 wrote to memory of 4884 3296 chrome.exe 78 PID 3296 wrote to memory of 4884 3296 chrome.exe 78 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79 PID 3296 wrote to memory of 4560 3296 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com/search?client=opera-gx&q=google&sourceid=opera&ie=UTF-8&oe=UTF-81⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe2d509758,0x7ffe2d509768,0x7ffe2d5097782⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1776,i,16249842210517467042,45890466059284272,131072 /prefetch:22⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1776,i,16249842210517467042,45890466059284272,131072 /prefetch:82⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1776,i,16249842210517467042,45890466059284272,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1776,i,16249842210517467042,45890466059284272,131072 /prefetch:12⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1776,i,16249842210517467042,45890466059284272,131072 /prefetch:12⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=1776,i,16249842210517467042,45890466059284272,131072 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1776,i,16249842210517467042,45890466059284272,131072 /prefetch:82⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1776,i,16249842210517467042,45890466059284272,131072 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2336 --field-trial-handle=1776,i,16249842210517467042,45890466059284272,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
144B
MD5a4e1b5e35678b9305664c0817f5b1a65
SHA15da3b4d7f37aca19164fef9f318ebfe842b8d18f
SHA256ac336608bcd7ca645637fde35a1cfb67502876b564e09c67f66f5925eb13991b
SHA512c14ef43b0cbf7a9c98d31017180c5be0b29bba197c20201b6fc1793e5a949aa404f27c41ff095a425a4ee33970899e6bd145aeee04aa43e66ed86092b687918d
-
Filesize
1KB
MD5108abb185502ebf63a9c04b3e0c9d28d
SHA166af1f9cb21b6b235f91246ed6e97f941ded476a
SHA256a6be972923108a8957caa50e8ace24ff1476d633d96d47e0bae4ef8498a38f42
SHA512b5ef815adec6a4fdf7692a5b4f5e9ce6214e7c88ab92eabfa02907bb55a5454049c66b07731755657a5c2b977e1c94e7663de0e913c01de912caa199bc530fbc
-
Filesize
1KB
MD5f4917bb370d9acf6ba7c090fd0f2e788
SHA18d2671fbcb1d982eab2621d4d9da1d367fbd4bdb
SHA2564e778a9f850da1e421f5a79c44765e2639530d74c10eafd2873264f4bdf69488
SHA512c5eb87cee927d4880e1a9135e2214b98796a62ac394c570e739c104632a1dedc5c7ad097cff8a1e62c02a1c8fec3628e79bb447ce6b4791d5465f76668b554f1
-
Filesize
1KB
MD5b22802bb53634850de77c2a75ea933b0
SHA11dbe720b5e2c28cc1007787f946b35558f21e288
SHA256a26c0c998c0ba98c03d196429c81628b848e1670bf43f3eb070e147e2fd47c65
SHA5123d2898f468efeb5733bd7d7b945429af58f7cd55e6daadd7a9149690262c12e1f81fdf7c9afcd927d66a25f6c0f5a7d9a1fa54230aaa7284d8e947fd5dd98122
-
Filesize
371B
MD556c3b43f505d62a1d21a4d8bfb4811c4
SHA1211785bd116eb8c8e64daecae447f1354fa3fa11
SHA25657d966af7db64c32cea49b7decb6065f8b677330a99b1c03fbc9657624c56563
SHA512265e1991e76b443625041d6dfaece9026ce837cdbd945340e4a8325c6810637657606dc3a6ea240ed983adf008e54705fc026f5be0384038d9ff6db9890a309f
-
Filesize
6KB
MD53bb8150d28307c3d84daeb459f538903
SHA10fd34f569daa0ab1a5922e63f37026a93a03db11
SHA256ff93948dc848f96ac034c972727e39042849f05a7dc0ac249983ffba363967d4
SHA51288cf1afdee1c88d75b1ad3269f77499cc8fc27d1f61b4cb175e793706c4becdf9f22ee285531f2ec4caa2ca032b8803cd690abb96c7bc3b8e740c2196682b3e4
-
Filesize
6KB
MD535dedccb46dbff805f5a3c94454d37ce
SHA126971764f80eeba3af5320c4b1a188f9c1aacc51
SHA2562e978b173b3a1c1880172b80ac11a4d2d61594682f714ca4b2618cb369b8b222
SHA5124fdd6cda35d96d994823574211bdf6ca8dc2bc1d49a92e63fa3859ec85873f7f9185db5da3fda2a0304c9eeaa7f59a52cc6a08e9bd0d02703024adfe334ebd54
-
Filesize
6KB
MD53264a58c7d50df74227b388846807569
SHA1ff93cbda76c8338708b6e384a5db2bd88d7bff73
SHA2569a08be57ada76ef29eb5f625327f59a5d76917e9f31336b44a2f3ccf67da22c6
SHA51245e17482a8631c64b58a3896b1c5018d47f99496147ad63369a3a57320127dff4e936ac6fec863612a06d5db359736ff0c1d497a32a9343045b5eec4f32f5dda
-
Filesize
136KB
MD58c025dbfd611c16e7ec3393f81de0fcd
SHA1e8074eea38e94669d2f6f91f9dbcd2e59e740635
SHA256215434bca603945abd43383ac2d769011593e02d27f0c211b7634c4341f55f79
SHA512d9b29befa4747d6c76b6e11152d1ea47054cca70935a38c721e6b7fbf3b33c4eb842bc9195e5c3c7661355c314ed236eb0aa1b57677508e8c10a71792bde3383
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd