Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
111s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/01/2025, 15:14
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133814276637634869" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3124 chrome.exe 3124 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3124 chrome.exe 3124 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe Token: SeShutdownPrivilege 3124 chrome.exe Token: SeCreatePagefilePrivilege 3124 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe 3124 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3124 wrote to memory of 3196 3124 chrome.exe 79 PID 3124 wrote to memory of 3196 3124 chrome.exe 79 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 1668 3124 chrome.exe 80 PID 3124 wrote to memory of 4168 3124 chrome.exe 81 PID 3124 wrote to memory of 4168 3124 chrome.exe 81 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82 PID 3124 wrote to memory of 4408 3124 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://security.microsott.no/rel/TRK0Q6EZhdYW3T1i6m2JxsPYwgY6fwsk1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0860cc40,0x7ffa0860cc4c,0x7ffa0860cc582⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,2807444567076325366,7207956088620977139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1800 /prefetch:22⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,2807444567076325366,7207956088620977139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,2807444567076325366,7207956088620977139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2340 /prefetch:82⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,2807444567076325366,7207956088620977139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,2807444567076325366,7207956088620977139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3672,i,2807444567076325366,7207956088620977139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:724
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e6f8aaf56bce49ee3b38114ae930f195
SHA1e9c2cd0fe7cc43d0a97cabb4036ec59be14d9d71
SHA25609668d42b814564bf0642018b7428c3a1d968fdc3b595743c52f071ab1d009b2
SHA5127974892dd286b78c67951e0c8215e983b9868bf43dd871b016bd3b776470bf303dda12bf244956554f1bb2c765255bbf0f47a183eeb0ad03784702e006179dc2
-
Filesize
144B
MD5db48f0a6803ad5976ccb818866766d8b
SHA171004a6e0bf498a217ae33722296d76126e0c900
SHA2566bb564ddece5743d1b61e3424794166308cedc69b1099e6b7d1c242b29fc59b4
SHA5127b0cfdfb37d54b9fc3cc2827eb00dcf812c449999adf5f19ea5283ae0d6a953300633e1c8c5317885e351208f9760914f38ab5c385360ce053e15112255732c6
-
Filesize
2KB
MD58740f5457436b9f2f0a74a7b25bba283
SHA158bbe12647c46e92c93fe996c8d6147db255bdb3
SHA2562bd7fd352816f4acdae06db1433909378c60939700006974cb576761bbbd2d35
SHA512b187600e402a502710df0073cedb4b34ea54f22521ca9fc09e52703334739567d555652893cbc6960a0f1c7071ac51bd1d87532dacea4cdf12d5b77a01b3acb3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD543016a5ea62a336b653acb3a1f9366f1
SHA1a89166c874e858420de1be3927dee386885d8392
SHA2568a2293575efaf471a745b9293c473d39043b6fa0d07928a52745becea2772d12
SHA5125eedefed9673ef56b7a2962a6d30bf39681e50d7a92d7a7cee4f1b8d0aca68e07015d5bbc70653ef2be1f9169765b841e2da5c7ac0f619426411771911326566
-
Filesize
523B
MD5277d30c2b189c1cb104bbaaddf76facd
SHA1f2dabc0e9938d9a04e72301b8bfbd958fedc007f
SHA25650596be532f0bf5b3cf6b002303ff8b70c6aec4f3eebe435167369eb264d16e0
SHA512ab0fba96ca892a7287808d0cbd501a3bb135280fb48ddd132ba7ad76491288988808b299cba30b4deee6c632d7b8c26d9f0fa80a2d0696eb5a20c532685fa4f7
-
Filesize
9KB
MD5f4bedd960918a6d0fd4caa2d5f40b3d1
SHA13ffb60977acc779194720121c1999201f3fedcee
SHA2569bd2474d14f8031dd9cb3201fced92eda501a23bc139480631571edf854b4b65
SHA5124897526e4863553007701a0f2935f9b3071ffe216a176f1f8d589b7443c7e682b45bd3ebc9a7ce35e3f7eb0048a3050b58bd42ec7b46c244feef72ec1e177ffc
-
Filesize
9KB
MD5c262282112e41316d186e2c927a6c6e2
SHA16a7b8f22a6aca2c0a4cef55f806b4ac19df56da0
SHA256cfe1719be188170c1a423677f32511ac88bccc54452e917f3bb2259cf30556a3
SHA5128fa4889665b31a0283c19cb32dd38c8ddf327e7a2802d94c8f633388708148725d606c51913634acb7a54ede417bdaf935335d684c94102ada23d4bdd3747932
-
Filesize
9KB
MD51abfad17d0d12954d481d7e3fcf6dc7b
SHA1f8cd861505df75d0353fda49ce3fb9dfdbcaebb4
SHA256e0fd5efe72390e9cef9e4f9bb801dbfb9e41029da9f9c27cce3377bab9db10fc
SHA5128fa64be06168585fe03cf0142c2ceae7de2ecc3f8008f61082d2cfce47b492c8d9f78d48f2a9a6c6b26ca8521fbc13a3cc835b856d1df8da23f9e33bfc8bc842
-
Filesize
9KB
MD52b1e31cc18aa1749609bfab06e5d00b0
SHA1472fa20352c66c8beb680fe14ae986558f7c2b14
SHA256da6bf8086afe6ae074ab1cc059d5ec2568b84899cec04f3f2aed7523bcd481fc
SHA51217b11b713dc02547a476261c8dbba8ad27f166d39ead4f98502ea6ec5965d0b0b6a27ed55aa8b87e4019743a8b9e131f204bec7ef13439c5d0dd2b4114e50856
-
Filesize
9KB
MD5048bac665048c52041dd084ae5ca8619
SHA1e79259736504afde2400da5aa79528a3fc03d27a
SHA256e6b3f422f91c6171e65d0ed15e34d04dde7f501c82694afd21ecb3c9e73c1e63
SHA512a21a5439563d9ed1f930720a3c05d5e3dcd4eb64add0bb33f3828811fb5a9845946b6185d6c32f6b515806283d7aa07e8505457b9f34eb6aa0701d2d1cfc249c
-
Filesize
228KB
MD56d584cbbeb348a141e26cff985f49776
SHA1c4d307a276f7a5adc619d922ba11519c0cef8b31
SHA25642affd7adb3f3a49e5064828a58559ab58642c7a6f512c8f92c4943d4fca5bf8
SHA5127ebb6e99a6b742cb0beb3f8a8f56e0f10d6cca0c8e4a920806290e459bd010b62360859d5ac7e9e2a867c2f9319b86c9e92a83505516ef4b483712b31572de05
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84