Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
594s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 15:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.sti-limited.com
Resource
win10v2004-20230703-en
General
-
Target
http://www.sti-limited.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133378819115239807" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 320 chrome.exe 320 chrome.exe 1756 chrome.exe 1756 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 3552 320 chrome.exe 81 PID 320 wrote to memory of 3552 320 chrome.exe 81 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 2892 320 chrome.exe 83 PID 320 wrote to memory of 4764 320 chrome.exe 84 PID 320 wrote to memory of 4764 320 chrome.exe 84 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85 PID 320 wrote to memory of 1784 320 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.sti-limited.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff989109758,0x7ff989109768,0x7ff9891097782⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1876,i,15460267115593678232,4553423780898708025,131072 /prefetch:22⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,15460267115593678232,4553423780898708025,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1876,i,15460267115593678232,4553423780898708025,131072 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1876,i,15460267115593678232,4553423780898708025,131072 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1876,i,15460267115593678232,4553423780898708025,131072 /prefetch:12⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4508 --field-trial-handle=1876,i,15460267115593678232,4553423780898708025,131072 /prefetch:12⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 --field-trial-handle=1876,i,15460267115593678232,4553423780898708025,131072 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3900 --field-trial-handle=1876,i,15460267115593678232,4553423780898708025,131072 /prefetch:82⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2332 --field-trial-handle=1876,i,15460267115593678232,4553423780898708025,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD55ab32d22d7cba3162c66ebb123a146a2
SHA1ed75f6e2855fd1a7870e474e6afb4667618aab82
SHA2560148e18de8222d7c97511486cbf40a49246e5882dc515cbbfd7caf28a14cbc0b
SHA5124f38146ca33b7e60800138dbfa4f6d869a6f4aad9b1f215ad0e69c46b700b95f5af2e41b0a8f10af62e220c13afa3cafa488b1239c6c318feee2fc9b612532e5
-
Filesize
2KB
MD59ec570594ef5adf4d6643261e90ad21e
SHA1c6c1360ef9a8736ab2ff6163571b2a8986880cb8
SHA256ee456b00c47565aa66ad0ab5c7deb5b3e94736a78181bd8475841e68849218db
SHA5120d9933f68cf94286d9b0c8d192c9ba9630e09a0fea38499045b7cd5da2dc6d9768cb76280cd1662f4a75c6824e91ef9a45ea122369590c149ede60c9977a6068
-
Filesize
1KB
MD59af85ccf18ede46dd785aba296d001de
SHA1b2ba87db8adffc85e9e98adc500710ea20b17538
SHA256d2c76ffd2802fba5f95c959ac9cd3186d61caaffcd703a0c19d969aa3411510f
SHA512a491e9ab5fd741330b08bf7a8fa9e7d203df67bb3123881433c06dd2fbed86d23146b4ff364601158471553cc05df2f13c379f5ca9467acca82e9ee488a1c241
-
Filesize
6KB
MD55abb29f736f8b719bc8d48922df98461
SHA1ef53f071b988019b9c0347f93451b65a55eff4ff
SHA2569964c2b998f2357d6db26bd84db8ae181fc95ffca4b0999486121334bc289167
SHA51274aafeea5bac250a09b6b0cfa94ecd35cecd2cd3d991c52c896ca6d1f8fdf6f58f2fcc3227231bf2f1455fffd6f03eeda52d67d84fc29821d3636a84e25a56e6
-
Filesize
87KB
MD5973d581bc95f026056f0ac19074ecf14
SHA1ac618532a709c54090d02b9f219961cd5e19c62c
SHA25633c30bbc2c0dfe3dc4d6f9ea64bc13571ddf6d1c7eb088699ea5a853b9f9d682
SHA5120deaacebba60c461ba36279b2ceafe2849f53091e5bdb9502087b3bad40888e27f63c8e726d283e982ffb8656418c071644cddcf979c75ffca9b53981221dba6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd