Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 12:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://forms.office.com/r/FL4SQBQzmR/
Resource
win10v2004-20240709-en
General
-
Target
https://forms.office.com/r/FL4SQBQzmR/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133662122651332879" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1892 chrome.exe 1892 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe Token: SeShutdownPrivilege 1892 chrome.exe Token: SeCreatePagefilePrivilege 1892 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe 1892 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2516 1892 chrome.exe 83 PID 1892 wrote to memory of 2516 1892 chrome.exe 83 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3612 1892 chrome.exe 84 PID 1892 wrote to memory of 3796 1892 chrome.exe 85 PID 1892 wrote to memory of 3796 1892 chrome.exe 85 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86 PID 1892 wrote to memory of 1724 1892 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://forms.office.com/r/FL4SQBQzmR/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdbdddcc40,0x7ffdbdddcc4c,0x7ffdbdddcc582⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,1721850296406606162,515916570281486105,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1972 /prefetch:22⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1880,i,1721850296406606162,515916570281486105,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2008 /prefetch:32⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,1721850296406606162,515916570281486105,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2268 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,1721850296406606162,515916570281486105,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,1721850296406606162,515916570281486105,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4652,i,1721850296406606162,515916570281486105,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4660 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4848,i,1721850296406606162,515916570281486105,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3696 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5852a63cc75ddb6ac77289c2c3983c7f6
SHA16c32e71021210d662fee1a501bb1a87fdd7545ce
SHA256f76832c405e68725cfbecb621a0e5def4a425c87c80fa4fd93ddc2776eb09641
SHA51229e80307eb9a015c238ba2f2b28ee16b902431f9762e2c0ea551b9956214cbfc36a8f855e9c478d585ae94d959fc82388cd930b954924eafe5820082fccb5ea9
-
Filesize
360B
MD5e328cebf616831ceebb111f001b4c8e5
SHA1a3391f61a6d69b27db7b9d0cfd34597b49894c3b
SHA256d8f407a86b630a82b8c69f0636b85483883705483fb3cf03ff94b61254382987
SHA512f099193fb2ca0aefb7714c6dd9177cbb19a0d4ba291070d202993a7c1880e20ad76275617ac61d05aefa0e58b053739989639a44b592e483091eaa128533b665
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5cb4c70a628593dcab0ebac3f94de69a7
SHA1d0816c67a13b9d4fdb540a36bc862750000c8fae
SHA256b2ad1ba58de9d98248b798fe1bfd6e20ab60d9d101a8a53a0105df2075448ab2
SHA512ade62a138e283d0877b64742628d82b268ee3daee80342a5d123e8613cbda62d415c62e25a45dedc4d4582053c38dcc7d6cd97070e6f67ce40007f611ea30240
-
Filesize
9KB
MD520087ec73ee8dab9bc609d99b3f865fd
SHA17f06abc7f3b981449cef67f9609d536b69aa8ed7
SHA2564610fb3ccf04c367d4f30ba4af3df6b9939f7789c805eb972330efc51c208598
SHA51243f45f9cdfb3fffe12f4cd7632874c21ab2622a80814b30fad1da2d5a9705d83958d112f61340aaa2ea92ce14e3e52a7198fb9f89d064fa2c501a9dfe186161a
-
Filesize
9KB
MD5dbf341e9be2245162d1a21a4ec1e0caa
SHA124697a162e5fa563862e84076f2a140178e7a133
SHA25602c8b57cefdcc74269c85796c4f03605176c79839b6519ea0eab6cb587e8992e
SHA5123110f10f7ee8cf7e949661484e0317f4cb0da2cece085352e4a83d7a624b8d4a1427740a4c001ac17bfc773349219355e4e59fd2e15d8ea47d4b9853da4f4c10
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\915edd56-80aa-4d6c-a8eb-a70361c8d444\index-dir\the-real-index
Filesize72B
MD57a0fc1fd57691b1140df6db5dbfd3f81
SHA1654a90ceebb47db993bc2b6cd798ae068f6fbed4
SHA25630955a1bd128e615a88c4521886ac816a293b041b9afcfc09282b3961b415b74
SHA512a3d46d63f51f9d42294f48c6894708e25cb1667e6d88aa370907e52cf229b4fada3a9f0249fa68aae248a14d5329d1b027772552566772d0a42cd7230af1f307
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\915edd56-80aa-4d6c-a8eb-a70361c8d444\index-dir\the-real-index~RFe5bd01e.TMP
Filesize48B
MD56bda16bb54b65b18f58de3cae595804c
SHA1d0df952e54bc63ff24a10d8b681c5e1ad82b4cd3
SHA2566c46b876ff74d0d5036872e56db448ce08cb2a9c861f910c2b3fc358f0449575
SHA512bcd3a094025470fa3626e5e19bb76ccf095666f5ccbdf6c32957bbe2adfe05abe45b056b811409ca82b8964985bd223a3b29648458ba7e3e8b517053b91ae047
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\index.txt
Filesize117B
MD5b9b439240e26952d770db01790dbfd5d
SHA1c8c60aee91d718643dcbaf25fcc0a456e84458cd
SHA2567bb188b3177a8b12943f71c0b400b620ccaeaf9ab20d477517674410c4a106a2
SHA512e73ecd540f06d7096334f811b65581e97611b2f2f4ab39371a1cbec663ea8cb086c3a1eed11da1ac427259b14e29c35385f059222915314372f6dee214fe512b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\index.txt~RFe5bd03d.TMP
Filesize123B
MD565ac6427a1fccaa96f371624c4c38382
SHA163491686c5ac477c6bc782b81a4a7724506cfbe2
SHA2567c8e776d7f1cc24d437d883f66de5f73b98c5524d9cceb5c32e0296c0cad7ffa
SHA5127866e7be15bfa449f73c25fb7e4553573f63fe53a2bc4ec25db1b18345d8aa1820688575f66abd4594323fd6f4e8427a006775b764fce2b7dbc8c7a5425a5138
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5402576ebd0d8169c423cffc6ea3fb37f
SHA151f1256c26065cd02baa1944fabcbaac57d8291e
SHA25629d73a19c68309d993d3f7d73af4043a330de7870e38090892b6a0e498ef3c79
SHA512d24e8f40d2c0e9b2ce281878afafc2305616751ca600e850430b91a387269ece48da194b4f27fe3d45096f1a9b08bddc23423c038408d4729c514a1566ce8f8c
-
Filesize
92KB
MD5495a47830409a052891b2c2f851f2e21
SHA104df1ac946c8a5815fc6bd8fad27cf76a505e52c
SHA25687a32301ef3e02633b8487e5bfc1fadfe3b1464fdd878f18e8733e9a6271308c
SHA512833065861ac9e9d50658820fb18ef02a6bf725abb7144720e4f6fb39fdd667bb542eba89fb2e209b539385ac4eacdbb3420d099c977b78f68361d7bb6489fbb7