Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1199s -
max time network
1153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 02:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://joycasino-c18.xyz
Resource
win10v2004-20230831-en
General
-
Target
http://joycasino-c18.xyz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2536 chrome.exe 2536 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2768 wrote to memory of 3776 2768 chrome.exe 48 PID 2768 wrote to memory of 3776 2768 chrome.exe 48 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2032 2768 chrome.exe 83 PID 2768 wrote to memory of 2244 2768 chrome.exe 84 PID 2768 wrote to memory of 2244 2768 chrome.exe 84 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85 PID 2768 wrote to memory of 4640 2768 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://joycasino-c18.xyz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8b8c09758,0x7ff8b8c09768,0x7ff8b8c097782⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1892,i,239664084606026997,4791943282048048852,131072 /prefetch:22⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1892,i,239664084606026997,4791943282048048852,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1892,i,239664084606026997,4791943282048048852,131072 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1892,i,239664084606026997,4791943282048048852,131072 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1892,i,239664084606026997,4791943282048048852,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4412 --field-trial-handle=1892,i,239664084606026997,4791943282048048852,131072 /prefetch:12⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1892,i,239664084606026997,4791943282048048852,131072 /prefetch:82⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1892,i,239664084606026997,4791943282048048852,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1892,i,239664084606026997,4791943282048048852,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD51a951f1fa792c0c8475342c48ce40d24
SHA1ac5e3dd99e6bf52413545c8e4874b32451676d52
SHA256025e9dbc4b214fc1306f2b6a2161dcc4a1f2201fb5c8b50a6d7c2cae85a11658
SHA51203a915fe9fd879107d2f9ca3c785c5416cb590c79892451493e3d192181c49ab6a5de4cc0c9872ce8f8872b45dd2b74acddcdc206cec205db4a18e182bf28999
-
Filesize
1KB
MD5d0d222d65ed666c00bb1cfbb721e8758
SHA1a1c077a6988d9405ebf4e34410ac457def2ea731
SHA2560b815ddd8d3385c7ba42d9605f73e68c1cbe26d6a3ecf40f488350ef1998cb62
SHA51209d5fb4c9154dbf2effd26e47ac339be4964234e3b1dedd752e35a170946fcb13c3adad6cf0d0cde404718c93da1fca2b114d672aa453329281d72824963d3f8
-
Filesize
5KB
MD508f29ce313f76e0a9c95da925f875b99
SHA1a824df34f034e1d829b33e7b9c2582824edaddee
SHA25642f8e7eb89859fb1c4d71fb3b4affb196921cda2386ec796061d3b8d02e7e218
SHA5129b2312b41daa2e435385720bd5427a1dad236ae9219be1b4168ae2270b9e2096d24f074faacfac1185dedcf944b8a359a9635f27cd01a13d58542d0541ec8025
-
Filesize
5KB
MD5ea8a3153f88289a77cdf5bb32c163a35
SHA11888f35282108d5121053921276db02042ba6221
SHA256de66fcc588b50b5730388a4a125bb303fef5c9c67f5af186f7caf4577d573647
SHA512b8ceb151f277005b4af6dd108baef9e1664555917f58d5308b8cfa21cb0abfd987fad08cddbbb9b95a9d5ac59bb4e50cf42ed7fef233e999f3b0faa56b92f502
-
Filesize
6KB
MD5da9c5dc8a2848bbe37e6d66e81b6587b
SHA1398849c7e46f38deeb3ddf4c695852d1331fe95b
SHA256b9691872d0e835b99b6baad6d501aa7f3ba0370d42d2d6db7f27a51f3c9a8840
SHA5127bdfcc8e140dc8c19bbff51e051becf66a8dda84a30413b347ef350e84016fa2493f2408f34b8e933fb5ac926f9b92dea3eff4285e7a318c223ff22ac2231849
-
Filesize
97KB
MD55f6a78d5c821eff37ee5d6def9ceb7eb
SHA128fb619a873858701fae2535d58e281665262345
SHA2564dae18a4fdeb3446945c0241e45701218cd197fe5332856694cbe6fec3911506
SHA51239c14762f25d5707e597262db06491d23fe425279f9f1691667b8662f1a9c2887032e9c7f3104a060e019d6971fb26e72708c843efc077ed84db6153edc99323
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd