Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/10/2023, 21:21
231006-z7dreaac55 104/10/2023, 06:57
231004-hrd9kahf9x 103/10/2023, 02:22
231003-ct2vrafg31 102/10/2023, 04:37
231002-e8wndsha29 130/09/2023, 02:42
230930-c7c4jshf47 129/09/2023, 02:43
230929-c72f5sgh43 127/09/2023, 01:36
230927-b1pnbsgd52 127/09/2023, 01:36
230927-b1gbyseh2t 126/09/2023, 23:54
230926-3x9ymsfg74 1Analysis
-
max time kernel
844s -
max time network
441s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 06:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dstat.cc
Resource
win10v2004-20230915-en
General
-
Target
https://dstat.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3856 PING.EXE 1196 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2860 chrome.exe 2860 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2860 chrome.exe 2860 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 2860 chrome.exe Token: SeCreatePagefilePrivilege 2860 chrome.exe Token: SeShutdownPrivilege 2860 chrome.exe Token: SeCreatePagefilePrivilege 2860 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 776 2860 chrome.exe 44 PID 2860 wrote to memory of 776 2860 chrome.exe 44 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 1632 2860 chrome.exe 88 PID 2860 wrote to memory of 4896 2860 chrome.exe 89 PID 2860 wrote to memory of 4896 2860 chrome.exe 89 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90 PID 2860 wrote to memory of 3452 2860 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dstat.cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93fe19758,0x7ff93fe19768,0x7ff93fe197782⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1824,i,15468467704827028868,3223056286695922538,131072 /prefetch:22⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1824,i,15468467704827028868,3223056286695922538,131072 /prefetch:82⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1824,i,15468467704827028868,3223056286695922538,131072 /prefetch:82⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1824,i,15468467704827028868,3223056286695922538,131072 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1824,i,15468467704827028868,3223056286695922538,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2952
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:1712
-
C:\Windows\system32\PING.EXEping -t 62.112.9.1652⤵
- Runs ping.exe
PID:3856
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:2012
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:4452
-
C:\Windows\system32\PING.EXEping -t 62.112.9.2372⤵
- Runs ping.exe
PID:1196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ce72bba6f198eb6aec49c078e694074b
SHA1d7b218f44a92d16bfe942e42bbbdfb103162b0aa
SHA256f0815424f9bf5fee007146257df6da90c6d6dc20c5ddd331a59bd1049eca46f9
SHA5122a63882d46f02b6ebf823ea4dc9cdf46f2b53e8862b5e33109231bab3a0de1860e0004059304b1756400f5fc5385422c1d7a7940ba2f60f5bdb41e16b19a47d9
-
Filesize
538B
MD5550e1e3ccdfb45b13e30c1d0bafbea89
SHA1c439fb0885728cc57b955437751786e32c475456
SHA2562befee46a1b2691b21ff301fee5bb259b9fa4e5aedf669b35f8181550afd0d91
SHA512b6bbfdeb025b82cfa8361ec1a2ab6a48e0e12a1740dba544eeb201cdce218e28a2d8b26e7ed45b4df7fc4d76d2faf51fcb3af231a21f0d70b5934c3f393a07c6
-
Filesize
6KB
MD561e2ac8a8b150b687b1b51cad249fdb9
SHA11f0812315e28792bc563f43b838bac9c617cfc75
SHA25677aef15218242ba0e71d922f7fe68f24fcb9c9eba592b2349e5253c51652749c
SHA5120a4c1385d97b0a5c5a5c070b385c95ad5490a20f7bf5e5cd42bf5db7cd4d59208e6afba0703e2762a96b80665695adeacc9a520e61c1fa78bdaa720452cb48bd
-
Filesize
101KB
MD51e8bcc87703676b24981b210d5b2fac7
SHA1ca647484426b2a281bd5831f8b386d4cb2f7d933
SHA25638dc3f6dfa9a43afdcf366d6cc4c325ef7757e601e8b9953b060791019330bfd
SHA51236a6eb8ff0020378ab5d5dff524c705c0340d87cd28a173842b41e05c3bf1bc45ec1e884d0c9cb54097fcc3cacb6eeb0906e88ab029f55e4ef1f61b411f83f9e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58