Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 21:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://crispx.com?mc_cid=9a21e6236e&mc_eid=UNIQID
Resource
win10v2004-20230703-en
General
-
Target
https://crispx.com?mc_cid=9a21e6236e&mc_eid=UNIQID
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133343627574031198" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1344 chrome.exe 1344 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1508 1344 chrome.exe 84 PID 1344 wrote to memory of 1508 1344 chrome.exe 84 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 724 1344 chrome.exe 87 PID 1344 wrote to memory of 1268 1344 chrome.exe 88 PID 1344 wrote to memory of 1268 1344 chrome.exe 88 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89 PID 1344 wrote to memory of 824 1344 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://crispx.com?mc_cid=9a21e6236e&mc_eid=UNIQID1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff904269758,0x7ff904269768,0x7ff9042697782⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1916,i,5085526350952852725,8444614640294914162,131072 /prefetch:22⤵PID:724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1916,i,5085526350952852725,8444614640294914162,131072 /prefetch:82⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1916,i,5085526350952852725,8444614640294914162,131072 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1916,i,5085526350952852725,8444614640294914162,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1916,i,5085526350952852725,8444614640294914162,131072 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5116 --field-trial-handle=1916,i,5085526350952852725,8444614640294914162,131072 /prefetch:12⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 --field-trial-handle=1916,i,5085526350952852725,8444614640294914162,131072 /prefetch:82⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1916,i,5085526350952852725,8444614640294914162,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5300 --field-trial-handle=1916,i,5085526350952852725,8444614640294914162,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50688f0e634a07965e23a97a09296901e
SHA16e973fceb6a6c6675611706902d8433384b020c4
SHA25670539289bf4e2e44a08147c1466798a21d7fa87312674214c2bf0bcf658c71d4
SHA51213b314a4ab7cf982b6764664c6b2059cb4ab131cb8bf6531c46d8d209ddf6e04e62d32b3b5c2d68d4ce262565c280aaa77d48074185589e0a3297e7243a8a0a8
-
Filesize
1KB
MD59cf3a97a2db711d7240dd8bb40f724ac
SHA1899703eb79ef6ac4612700877ee8c1fe6a1a66c0
SHA25621766f99178291a24ebbddf341519e12745ed8cc567f013a60db6faf8cf9d9ad
SHA5123772e2e56a1a6be9eda0d7044966a150a31ba7e8e100e57f505a8e29fd4d4d2596e16a1adad643c81da563b0e92ed53ad1123c031947ba1abb1fa0f62ffd34dc
-
Filesize
3KB
MD568baa060aee7b30ea047b94e90a8863e
SHA180392209e9fbcdfa0fd1b7a8739fe2b8d9813339
SHA256ef81754b4a61fe09cccda8b0136ef6331dda68119e9521c6cece4f4c9db8a89a
SHA5123e3fc030ab330a328c75f1732541ac0d2d57d0af688d99a8694325890ac23efb2ebfa41503cbd663605e691eae3ecc550c47cccdeee20387c97098a377575694
-
Filesize
1KB
MD59e479d5687b9ecf2a5a90cbd07c32eff
SHA1b878f96004f7fc50086b563054bd6df9dd6a16a4
SHA25698a92e86dd326d5864617730a7970dbd3938b4160273c9447a553b53b21f45e9
SHA5126ccc16d4c903b7ee0ed47c86afaf855724efa8baa5c79fdda0425575b779db42aae9368f3898bd93378911c77e54dbb7a37f991124dbfff8d5df2c85169a8082
-
Filesize
2KB
MD54ffcecdcd3cf64e24119ff4c10a9361f
SHA1eb0a62847ef00c2ef75195bdd82a981604bc458d
SHA256e8f4a1d7c03d9f811b6c125b12a3cf1255f8d58ca3e407f18b70377f3a07a9e7
SHA512ec438f097e0e446212ab26c9eff6b7d84ca4bcb71ac239d421822bd215eac3a7488a8464ebc47168941b78481b9cfce04364ff08f9a96198d65ae38393e580bb
-
Filesize
2KB
MD535bdae9499acbd9d89c82babb22c515b
SHA188472b31afeea053dfebb4e60d7dbccb9daeedd9
SHA256dfba8f7313d66b1b93c16e0b218c29a8fd6ff3b5024b318c154a5a8628ede982
SHA51203fe22b0091b8b7957e180cdf1dad68917cb0458435544bee4563c04ce631fd79562786f8ba78ec740ee3de1fc75eac1abd39d843219586c427c2897454d41e0
-
Filesize
5KB
MD53687f68b049e061578849a0a9cf6613a
SHA115ee610ae47746379834b31b87ec1f77e9bba5dc
SHA256d12495cc8ec59783892f02908443cdd4d3dccc39d7732e6c8701bce6691dde11
SHA512e9bba4b7356eab2dc8959dcfd1d5a6a3675eef6148e801e528a46ac7674880105cb04c41f683f02b6968bbe6969e4b920d7fd7e88c8cd0f07ae069857a83b189
-
Filesize
5KB
MD58f77b2e1dd639a195ccae0167e9c4b5e
SHA1b7fde34a430e70815baad1b135653570aa7d65f8
SHA25699794514ad4df3deb55256ac0f3f9f551ac29c20ea715b3c46f266ee0cc0c333
SHA512cd74c146ece95bcac3f97268bf1f88920a00ac0b2729fbc22892377483fa6c1693b871557c4ceac959d306bfd96176885460dce1ab10430dc7f5f44c72a71163
-
Filesize
5KB
MD59648b603e4f4c10cbd7f142710818fec
SHA14043904a8c673fe6e64ec59f0db2d22a17e10094
SHA256551c7d756283a09fe2a3e6e83449d8569e4a5eacebfd3cf08a5738548ef034d9
SHA512ccbaee563dd754a82e45c0be237582621854a290c834e9c76cb8787e82c933abd2650451d1184beccfad462b762d2640c2c672c88dbb0ef10cd9ee140cef6e91
-
Filesize
6KB
MD5f1d08b997ddfbef1155d5061498c6e28
SHA193e8139c798d18319942130ccf5902eced6ca4b0
SHA2568d03d242bc0d1ffa374892ef18532438a98f13b9d3fcfab95fe927b07aa27d25
SHA51214d109654984adca234251cf7ef9b57f6e7b0bddf455531bbded7d288f2c7e0226a1f280c14ab5781d971cd2b448ec6bf88c15a1cfd3a423933eac59cadc57c1
-
Filesize
87KB
MD5a10830eaa6c35c6ebd899299edb51dc5
SHA10ad7d14e2f05498a9029067f8be945fb3c14a5f1
SHA25629877b033a813554d556a504c01fa3bdd62fb48e52f234503d7987fbc2e7bc86
SHA5124d5b7f533e2e255ec49206c569aa81e2fe794dbd8c4f6d6a4db428944a15730c6c5106d50bb30ea870c61256d9f8ec6c08a8ab53d2501e74c5d2058f9e6a5106
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd