Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/10/2023, 21:21
231006-z7dreaac55 104/10/2023, 06:57
231004-hrd9kahf9x 103/10/2023, 02:22
231003-ct2vrafg31 102/10/2023, 04:37
231002-e8wndsha29 130/09/2023, 02:42
230930-c7c4jshf47 129/09/2023, 02:43
230929-c72f5sgh43 127/09/2023, 01:36
230927-b1pnbsgd52 127/09/2023, 01:36
230927-b1gbyseh2t 126/09/2023, 23:54
230926-3x9ymsfg74 1Analysis
-
max time kernel
2179s -
max time network
1913s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 02:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dstat.cc
Resource
win10v2004-20230915-en
General
-
Target
https://dstat.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4576 PING.EXE 4584 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3908 wrote to memory of 4032 3908 chrome.exe 32 PID 3908 wrote to memory of 4032 3908 chrome.exe 32 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 4300 3908 chrome.exe 88 PID 3908 wrote to memory of 3720 3908 chrome.exe 89 PID 3908 wrote to memory of 3720 3908 chrome.exe 89 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90 PID 3908 wrote to memory of 5096 3908 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dstat.cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c35c9758,0x7ff9c35c9768,0x7ff9c35c97782⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1884,i,7873902604753735162,1287651471190134367,131072 /prefetch:22⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1884,i,7873902604753735162,1287651471190134367,131072 /prefetch:82⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1884,i,7873902604753735162,1287651471190134367,131072 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1884,i,7873902604753735162,1287651471190134367,131072 /prefetch:12⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1884,i,7873902604753735162,1287651471190134367,131072 /prefetch:12⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4844
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:3188
-
C:\Windows\system32\PING.EXEping -t 24.51.252.972⤵
- Runs ping.exe
PID:4576
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:3060
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:4484
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -t2⤵
- Runs ping.exe
PID:4584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD57ebef8240b33ed7ba6b3bd44ef04ddcb
SHA1be52cc8fd0699cb1ebfb1c77710481cac09d0657
SHA256710c0dca67a5e7d400c98a14cd7d253df18e80374da387dddb0f40e25be867a9
SHA51268fc67e2a5f2a5007e8a03b47f1080076bbf91100ef5e00c92f0f9860e98e66cbd29f9d3a77bee6d5379b973a0a2f65d81ff16041db78f8ffed332e0483f76fa
-
Filesize
1KB
MD5ce79f787d8b66132c38a7fd5a2436584
SHA14cb74695dd9a4cca9d5f7c19b84608a3fcc91da5
SHA256750c182d91b9249e5af384fc910f6b4d3b12194fe8f570c18830a04a93b26bb1
SHA51280d6bf0ead0e51eea7bec4cea085dccc14698bdb36a7a269b405409d8e33a176dfc443d6dee7ec5c2f5c42efca8783f4aad7da58381f52ce5bddb74ce09b16dc
-
Filesize
539B
MD5cf408226ee9b89800439fc2f254c7a87
SHA12a56829c1a3e7ae8acabb28c63f234ceb0f4f8ea
SHA256e7a0f4ed115975c5b27caf5dea79b54abb824c05d21275ea9c5c3674fd9043d9
SHA5125128e1d7454cab91b4cc6136caae91322c9a7ea8d562d73bcfc8bd9c344c68f4328f73963370751d075da3b47d6e187eb8aa3ce92d779150515a32d31a0e3179
-
Filesize
6KB
MD52828c7886897b18f4d708ad2dcdf58bd
SHA14bd645d77b1b116d9a153bde8fd4135fd48cea3b
SHA25628967b0c0e09eb231035ddedebea157ad56c85536a82065563180780c46e4b08
SHA512102999577b5f71c3684832059bfb214a549fb8f5875bcfff090fd96071cf8686b80f1087ced5941ad6c4aeb395a8158fafb73f3b3ef2c8764014a0fe2e40d656
-
Filesize
101KB
MD575e4a667278b8842b57998701f68b5ad
SHA1c806df065901cf3ddbf629f950fba93c6336a469
SHA256700412cf0275bd3efc203acec8e5f0a91c2f9605a48bb713ad96787dc15e7c4c
SHA5121123a8badce1d0baf071ed5b4e0e8633d5c1c540bfbf60d69c21579865e2ccd824018bea1a2f0f6ac3ab276467c14c24d5f5cad2215130deb21a6100b3b7249e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58