Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 13:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dropbox.com/l/scl/AAALxsNtxWKujQWBXdtRPj4uSheHP0Qm8Iw
Resource
win10v2004-20241007-en
General
-
Target
https://www.dropbox.com/l/scl/AAALxsNtxWKujQWBXdtRPj4uSheHP0Qm8Iw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133729524692159307" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 952 chrome.exe 952 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeCreatePagefilePrivilege 952 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 952 wrote to memory of 3428 952 chrome.exe 83 PID 952 wrote to memory of 3428 952 chrome.exe 83 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 408 952 chrome.exe 85 PID 952 wrote to memory of 3708 952 chrome.exe 86 PID 952 wrote to memory of 3708 952 chrome.exe 86 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87 PID 952 wrote to memory of 1872 952 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dropbox.com/l/scl/AAALxsNtxWKujQWBXdtRPj4uSheHP0Qm8Iw1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd5f9ecc40,0x7ffd5f9ecc4c,0x7ffd5f9ecc582⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,13525044963407235549,3152694480896487600,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,13525044963407235549,3152694480896487600,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2200 /prefetch:32⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1768,i,13525044963407235549,3152694480896487600,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,13525044963407235549,3152694480896487600,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,13525044963407235549,3152694480896487600,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4532,i,13525044963407235549,3152694480896487600,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4492,i,13525044963407235549,3152694480896487600,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5204,i,13525044963407235549,3152694480896487600,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4440 /prefetch:12⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3848,i,13525044963407235549,3152694480896487600,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5713b51c3315d917285d757f80d66eb3b
SHA106263583a916a407795f14d2a12e07c0a3703b83
SHA256ab07b3f44eac8b935f87b58d080591cf461220c7c32afa4aebc5a6fafd7aed4f
SHA51208d32d52c09244200228f4b2e03331d4def93369af56ee703dfd0bbfff9ecfa655d3fcbe957da78553efb1e151e7ac9b9657830c331d9d240a253c5497c1006d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD50aa496bacc88222caef3e4da5759cc41
SHA180fa9229bccbe1cefa5668127b0e983ec4a73051
SHA2567e547b11410390d7e62f7087b7de6d6ac9d4e8962f66d8469895611631685263
SHA512bad9bce0d62ea0ae07f52be096ab6b48c303a7f45a75cb5dad3a57dd305cde53559433141ea1bd6d3b938d498829086f5b33af3bc467ea81884932632ef8a44f
-
Filesize
691B
MD57dc905e0869910d497d8d43a57d4de48
SHA1d828b6b56bf50ebe0c0f60f5af9874d184439852
SHA2564a286801b1728538791ef6d6d2c1be77d9e66d2638b5a2e08bf79caf0ad6c5e8
SHA5121560ef0f3e81246e6ce1cd21224a201b251309714c5b57a6005856d54e6ff87a9183f50684ae87759247d155729d2b37d1a9a29435292fda9ea9e0990cf3d176
-
Filesize
691B
MD5d7d485f8482bbe468b268b92e3c49cf9
SHA1a5219b7de6b6d6e66fbeacbec4a95dc63c30e729
SHA2560c42dd4767ca8bb489c1a4eb56f44b488ee6e314e2e6652f39f75d6a07ad68f8
SHA512fecc162d9736c76ebc531c3461a77a8af9b0032d190eaf871d4e5c12acdcbe1e0d0707912e7f0dcbbf34b8297b8847ff1cf02f3bb0b3a93dbd477a15c4a5ff38
-
Filesize
691B
MD5d9f4bda72f0de00af9f425ee2fd36b6f
SHA1ce780c55aee18a353407d1a41b58aed39cb28684
SHA256e18f4b9f4e1c230e5e10f0241cfe66739697d9da3c07a55e001c7e0d9315ac98
SHA512f9edc6ffc506d428fba86378b3de230f965810fb691ef9b2d6ace2c1a8de0c6083c97685d062557cea5aa61a4a9ed20104a195a4cfe907613f41632b9294ddf7
-
Filesize
8KB
MD5246ef992e1fab34b237ea9631c8dcb4c
SHA10362c7f9b62d2b9cccb1fc88f7533ace8d2743b9
SHA256910e12e96e76811663e12a9096bd52347373b5f54aa1186ec88e6c8ad1c21471
SHA51264f7eb10728083ac233d5e8d983bbf99efe51dd24cd03908e76b72ac7f7fedc670e1f1fe842da90353840cb46048102edb38b60a334d5f804438d490a14f8bf6
-
Filesize
8KB
MD5c461b1a545aebeac322e6433c2655f9f
SHA19aaf494e81a96ed550276bdf8c8e90e196917074
SHA25628f5a0154eec510bfe247018c2e4afec8fd18462d11c845b2c00602f37ea3195
SHA512b524d894c5a676a22917d28500b4fb557e8c8a5717c70d7f8b91459f5f2666119760016cb63426e4fba85fcd4bc274d149b29bc2b10bc06b644be68777ef5ef6
-
Filesize
8KB
MD5926d24a1ad8d4def085c60230076411a
SHA1ebb41a81faf46fe942f48ff673311e4fa4425218
SHA2562b5e70e71539c6344cb489ab96baf10601c01ad31b24345970fa988f12c7c331
SHA512ca03a257b61127ded36d8273ce0a109df11840739c2dab9cac05895a385a3bcaa58f528569435bae79decd6bec11a3aa8bc0a7a4855c51b1c87d96c846179437
-
Filesize
8KB
MD537ae8b387a4e0993ec06944203a2802e
SHA1a7e3515ec2a7ea8bf59ff6669b3bff32b567daf6
SHA2560f22aef12c38e8f6d5680c8c174926db78551276db948352b7124f2e7c557089
SHA5128a6cf09f57e7204ff9bc6ec588f02e6faa30dfa4a805975c8195c2ed5bd454cf435f404d9eec35ef10d87544a442dfb2a506023683a6d85357499faadedde109
-
Filesize
116KB
MD5c94d7a934ecddfd7ac85dde8717120a5
SHA1b785c7db6a298c4687f22197172f764d34958657
SHA2568510e00966ba528f6dd3e3cf31143712d608353eb6e4cb180e00afa201dd3845
SHA512d3589c4fb06d4a6c0ba6f364ec0cc6a1702377f5a8b514915817b139187358a8f95e2fe8bda0afa101424a3d8ee3ed093a78c6967fde786606184f786c916a07
-
Filesize
116KB
MD56f2728f27aabec320c4f81c9fc029b72
SHA17c622f908fb880b0b5778bb6a3ac6eef85fc1f9a
SHA256e9bd3b771017b30cf0f113481e67e119a5b2cdb691922b6405862c313fec9f3b
SHA512984f09080bcaf1b0f981950caad2fa0f0b46133bf0d755d16cb304c4d8c3ef5853a11aeddcc7ce9ecd6c04ebca7336d3d8df3bc8e961e306ad731f160afa603b