Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/08/2023, 19:03
230826-xqhypacf65 826/08/2023, 18:13
230826-wtzvyaec51 126/08/2023, 18:03
230826-wm93bscd95 1026/08/2023, 18:03
230826-wm463sec3w 126/08/2023, 18:00
230826-wlsfwscd78 1026/08/2023, 11:10
230826-m94z6ahf86 1026/08/2023, 11:04
230826-m6lz6sbe7t 10Analysis
-
max time kernel
1800s -
max time network
1692s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
26/08/2023, 18:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://t.me/excellent_stalcraft
Resource
win10-20230703-en
General
-
Target
http://t.me/excellent_stalcraft
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133375523251902093" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 4952 5012 chrome.exe 69 PID 5012 wrote to memory of 4952 5012 chrome.exe 69 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4012 5012 chrome.exe 75 PID 5012 wrote to memory of 4964 5012 chrome.exe 71 PID 5012 wrote to memory of 4964 5012 chrome.exe 71 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74 PID 5012 wrote to memory of 4340 5012 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://t.me/excellent_stalcraft1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffde0a49758,0x7ffde0a49768,0x7ffde0a497782⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=256 --field-trial-handle=1860,i,2745042454952476822,18272247434564154512,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2592 --field-trial-handle=1860,i,2745042454952476822,18272247434564154512,131072 /prefetch:12⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2584 --field-trial-handle=1860,i,2745042454952476822,18272247434564154512,131072 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1860,i,2745042454952476822,18272247434564154512,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1860,i,2745042454952476822,18272247434564154512,131072 /prefetch:22⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4356 --field-trial-handle=1860,i,2745042454952476822,18272247434564154512,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3680 --field-trial-handle=1860,i,2745042454952476822,18272247434564154512,131072 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1860,i,2745042454952476822,18272247434564154512,131072 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1860,i,2745042454952476822,18272247434564154512,131072 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3776 --field-trial-handle=1860,i,2745042454952476822,18272247434564154512,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4900
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD57cebcb62f4bb4464c6a4762d0259749a
SHA1e7a857165d1b7cb9b65136f540e79ab6fdaad6b4
SHA256f9a1ca7fe325df96df11bbf7eb4726dbbb627dd62fe06ac3aea31218a06a8606
SHA51216ca34caa1ccfa4c6a86719d99663fc6549ad0f758a5e11751e57518e40e97953d3b08605ea62afb242d0bc291f2815f811b2420f142d7a0ba2fc06f3006213a
-
Filesize
958B
MD513f469eb1a4eb4c27200378fe02a307c
SHA1fb6f9399ceb2d3d2fb1129a237f22eee1a2cf898
SHA256b2450e022fae0ce00b43859133089eb87ca26e8823372eb5d4bbf26d54c22eec
SHA5124c137a7d0be4ea9873aa431945e3d28f37294af67a14145d26a1399ed7114a7c47f643d77ded38a7323838f1c0bce3e03888f36e61832869239205569bc3483e
-
Filesize
873B
MD51da4bb2a16767d5640d36991f3bf0d87
SHA17d79af9f89758a56429e3f02c8aa76f287eadb6d
SHA2569a104c249a7ace3a7fd560db41c537230c0aff545b31723ff3ef6a456dd9dcb2
SHA5120ac12404314f1671be73dd0f028866964a7926479645abe75ba4e150dc3c5bdbef2e726b86d5945bf08e3beccece0534c760c0165cd3b5248f8a3127783a1c0c
-
Filesize
6KB
MD5db6015fbd0c0fcdff6290fc88387dc43
SHA11d20a74fb2dc25560f76ef10791ca8622cfcbc79
SHA25693d6594ed03895639cd64cc149a11e1d4b132e8e22b65286b8791f5e4ee34236
SHA512363b6162ccf1ba1342cee1a90fbb2831176bcc44eae269ebc19c8cd6eef38e265774cb03381f98331d9125f621182f181064da325779e34b9762b76d6a5b50c7
-
Filesize
6KB
MD568e003f5c2294b87b951e0c9628e0181
SHA12e7e194503217c587d8df9a59bbc468be631fb12
SHA2564e7a589bf52cfe78dbbd8cb54383c2ea82509754cbde39910e316403dd776837
SHA512c66ce88e8c8ea61f58154b3bec4b200e0f54ab3201c52d345ecbaba52a9390701aca70e5f36144a208964511ae0c042f8346c09ae833d23611522bf54beb9743
-
Filesize
6KB
MD5c67278191175a8ef606f2438a92a739a
SHA1ece698115c4057e19a318a77ce8060fc8c1b96bf
SHA2560048202e5b1ef84849882a97efcad231b4402da26fe07864aa7f6a1a5dfba6d0
SHA512a4a2239c8e7c617f148f0600bb57d1ec715ed82ee12e02b28050df23a5afc1b17e680eca090ab60095aca55c45941a5bc5239f95a95eb82cced63e9680c337db
-
Filesize
87KB
MD5729acaebb1b9473d6d760a2984202bad
SHA16e58ce3db239c0637582f4e63657cf2122d6f671
SHA2561220d9df11c21547ddd2352222335bc6e4b74b35750dbcb56c6a0bc823ecffb0
SHA512d565433622050b4d786ceb2d2be3ac7e0424f5b5f877810d6a141967247d2c07fe955c628ebda44ce7114bf662e342d6aefb47a0a8f69eb4d07c226edd6ac6d5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd