Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/10/2023, 21:21
231006-z7dreaac55 104/10/2023, 06:57
231004-hrd9kahf9x 103/10/2023, 02:22
231003-ct2vrafg31 102/10/2023, 04:37
231002-e8wndsha29 130/09/2023, 02:42
230930-c7c4jshf47 129/09/2023, 02:43
230929-c72f5sgh43 127/09/2023, 01:36
230927-b1pnbsgd52 127/09/2023, 01:36
230927-b1gbyseh2t 126/09/2023, 23:54
230926-3x9ymsfg74 1Analysis
-
max time kernel
243s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2023, 02:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dstat.cc
Resource
win10v2004-20230915-en
General
-
Target
https://dstat.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2620 PING.EXE 2244 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1112 wrote to memory of 4392 1112 chrome.exe 42 PID 1112 wrote to memory of 4392 1112 chrome.exe 42 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 976 1112 chrome.exe 88 PID 1112 wrote to memory of 4928 1112 chrome.exe 89 PID 1112 wrote to memory of 4928 1112 chrome.exe 89 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90 PID 1112 wrote to memory of 2108 1112 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dstat.cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ae5e9758,0x7ff8ae5e9768,0x7ff8ae5e97782⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1804,i,3748978458619591462,2576155589205812676,131072 /prefetch:22⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1804,i,3748978458619591462,2576155589205812676,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1804,i,3748978458619591462,2576155589205812676,131072 /prefetch:82⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1804,i,3748978458619591462,2576155589205812676,131072 /prefetch:12⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1804,i,3748978458619591462,2576155589205812676,131072 /prefetch:12⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1644
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:3996
-
C:\Windows\system32\PING.EXEping -t 184 150.15.192⤵
- Runs ping.exe
PID:2620
-
-
C:\Windows\system32\PING.EXEping -t 184.150.15.192⤵
- Runs ping.exe
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5c06173c3b6154931fe008b30478c45b7
SHA1faa37d4271c15ab355b2291d1e3163cf0527a4af
SHA256fde60baca30fae299347ca0513db83ba2b884ff7ae6ee25d04f0a59953ac06f6
SHA51220f2a686a7bf80ad23d098d80ea6bc5c4c05f706c44568bcfe76cd9345ec4718557535cf2972409b8abc1040c7fcc5eaaa8804835eed515c02e111c42bb6a52f
-
Filesize
1KB
MD5debd4d5def4eb6e8a21514ab90df09aa
SHA16b0099c6e188dd841d23cafa3a6b6b2660e7f25c
SHA2563edda69c191b64419da55f0ce20bf9c4929097afeef0b4333a7e733ef81cef7a
SHA5126c91e78912ecb6ac5b289228a7382f5ad5a86272a00169a7fd300e0f40b12f651b11ab4580b800437a1acac491118f3cc93a424e1b210d71e85cf684f260cd3f
-
Filesize
533B
MD56afd6633fef041994989c262af1fd846
SHA1537f81da1060c4124bf4f8bdef7582dc3efc8ade
SHA2563802838d1d0adc74b7b9501512882b1db7871337bdf39b1d164cce132f2afd0f
SHA512956de907ba169dd4d115265e4ec3b054c16c8acde363034143aaae5cf2cf2f32afb68dda19f2be015933410945e3c4f7681bb256efc15b0b535ba5c7c26c7e88
-
Filesize
6KB
MD5008cef1017971ea69c1f6ccea6ac1f67
SHA1adfa2de603055653df6e01ff89bde14fa1748345
SHA25663db2c573151a930d586df262ef61c9dea54f670dd534ddbdbfa589b312881e2
SHA5126eff1e4e5a8391fe4ed58dedfe816f65d902bb07f4c0841abaa8cce130c47cf927434e793df38db0d76b39e2820d4c3efa48af42da9b0335a4eb0bf9fd308138
-
Filesize
101KB
MD59dd4a386998a262bf0af4b348eb88126
SHA1113c610a836ad6c62d72c89aab5128e7173d08b9
SHA2565f111e34aadfd9fa8ef3c119b5a79d2663fca5b9c9fac903d37469248c7a948a
SHA51288c648380f110db059885ba1078fb5bbe9f9a7c096c0fa6da5ed7e0c78905be25c571f054c81939e10eff01fd89145692618b8ad8ed7490eaebd5b0fca3b25fa
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58