Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 08:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://anpr.mom/
Resource
win10v2004-20240802-en
General
-
Target
https://anpr.mom/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133691336157015559" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5152 chrome.exe 5152 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe Token: SeShutdownPrivilege 5152 chrome.exe Token: SeCreatePagefilePrivilege 5152 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe 5152 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5152 wrote to memory of 5508 5152 chrome.exe 87 PID 5152 wrote to memory of 5508 5152 chrome.exe 87 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 4860 5152 chrome.exe 88 PID 5152 wrote to memory of 1692 5152 chrome.exe 89 PID 5152 wrote to memory of 1692 5152 chrome.exe 89 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90 PID 5152 wrote to memory of 2716 5152 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://anpr.mom/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8a8d2cc40,0x7ff8a8d2cc4c,0x7ff8a8d2cc582⤵PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,4324989849884970666,11398717171419666520,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,4324989849884970666,11398717171419666520,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2052 /prefetch:32⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,4324989849884970666,11398717171419666520,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2444 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,4324989849884970666,11398717171419666520,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,4324989849884970666,11398717171419666520,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,4324989849884970666,11398717171419666520,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:5760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3356,i,4324989849884970666,11398717171419666520,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3344 /prefetch:82⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4812,i,4324989849884970666,11398717171419666520,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:5464
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c5daf46607a832a08b502727da5d0ac4
SHA1b84d9ce67afb1a04fadd3bd02da28bfae0c3f61c
SHA25602b447c377667486dfa088ea991c2af7bfaffa4a323c9239e7592af6fd2e436e
SHA512a31ebb999c4aa87aef226a04b92548f2b7e94af5308943411703954b00ba49db21c02d931e29fd38fa4c4a96b6adf802dcdda559ef354822251e03ac5f531990
-
Filesize
192B
MD57bc0222fd442e353a3fbdb9935f67182
SHA1c56da982df17d25ea0879b28dee1456d01e89f0c
SHA2568581e9ae138cac0aa105b86b4afe9c133d408e52d3ef850620d3903313c04e9f
SHA5126c245f89b371462b3a5c87b751b851f18de42d62dab46c4c018393921c236fd0db4a277c971449aee50d774b9e72a0f314025171daf48391be8183a1ab214abd
-
Filesize
1KB
MD523736ebbecc0c034b7918ecc45ef4f43
SHA1159341501a13d15d64a4f2a8db86bf87f9a23e80
SHA256a2d3849ee002b889b225a73157e7f6ce401d5421d69f0b39344d0a32565b92ee
SHA5121ddb7c9b502d559be62adc48c0b7a20e60462c0c99e7e96e3088a54740c737f2f529919780a652152ac1bf5264606e55671f389e48360a5fd200708433805829
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD51fc3b2a68b6f182ea9d74b127d9f53ac
SHA1bfd3ff7e6c030826d6ee7c56d23afbdaad4b963b
SHA25693b6cd91973b512375185a47b39fc3bd66f98561dff6bb5246cc8442160dde2d
SHA5123bdfd28473ec2702291c03ae54a6319c503eb5ba6758d85a1947e273687a761234a2fce4656a9535a9d04cfbbeb751dd2cfed8246923132283eb9b43050618eb
-
Filesize
9KB
MD52f5d4e212eb9edbdcfb155bf43cd4d6c
SHA1654740146645aaffdf4fb659c99a765d679257a8
SHA256f4c908a08c6a23e1bebfbd245140de2844bf6af5c416bb9b0509c7b5dddf316f
SHA512775d077a7c10c3a3a4e43230e59d5ab4546d7db97343b56763498c64526ae3f2027d934594caa176d5665408c96a12ac1950e96c38fb46a2dd63cf398cc8a9e2
-
Filesize
9KB
MD5cc7bddc94424fe29a67734ddefec3160
SHA1b6cffa81eda1230824fa00d43fb9ca35de500d9e
SHA25618ae37b75f504144d49c799a339aec1e541359a6d1fdc9cd15c143059d4be1ac
SHA51271717563829d203f06afb8d38af597c76d37b3e0784d0cdbdedeeee844d16daf32e975f8518ab02a0447ff2142d4d5128d21364c738352947c56b7f150978fc1
-
Filesize
99KB
MD5793a6101e25749748c06bfa2fe307689
SHA1048cd0715cfb6d4ebfbb141b8c9e9d82d540dee9
SHA256ab74954e81ccab6aac8bc8e265d87960e09e300f51b2c702cbee885f3fd6f3d8
SHA512e97de921274373fd1202e2f43d3afb0198dc6e25e673578eb42bec2e68068af43dc271aa2e333ec26658b8d78f91bd15049d53cada247e2a967fbb0016333322
-
Filesize
99KB
MD5aa82f583ef557da409e542a1521c0386
SHA15cc8b4aaae95f9a707b86bd4234bd004be87f1ed
SHA2565f4f6a8556ee0f569071a9dc3f4c8b5790595785e26681064522e2a6021eb01a
SHA512ffc74e4f646073260b759f21120b5acd11ed03e27e6bfb510fefffb784116a6ca621896a6329835584866d403638e6c5792068e1d4ae182de07d911de7ad69b6
-
Filesize
99KB
MD5c6955fd2b5f65cc652778c4aa38816e0
SHA163ab66fcd7f89e03a9bda90c68f7f2b98d36877a
SHA256297f14203fc0277deef1388b9fc389a36bfd2240f50c9b2c488caecfc65a19c3
SHA512fad8f5032e367a3a5bc75467619b3d2c672da99f4fa0281eb0365181184625a3170211a180ca1fb038e881cf2b8929c8a5d5c2346238a4e1d8841ddfd9aba08d
-
Filesize
264KB
MD52fd2bd05c161e50080627b51735f0640
SHA12c35d737d96dc418af64d0cf58d4c0b6fe0c6a3d
SHA256c84902b9c9229f81b281a825cd0c3d5d13c489069e1ea6c01b8747aa8084b5da
SHA51203e92c366db6312f0370a8f6ba47a6d7581717c92450dc6ac46a2815a6d3f8b4f976cc512d29d4bc0f860f1ab3fda76cb5ddafec6b62b54397fa824c741a5b6c