Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 08:43 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://rivaholding.nl
Resource
win10v2004-20231020-en
General
-
Target
http://rivaholding.nl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4012 chrome.exe 4012 chrome.exe 380 chrome.exe 380 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe Token: SeShutdownPrivilege 4012 chrome.exe Token: SeCreatePagefilePrivilege 4012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe 4012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3368 4012 chrome.exe 81 PID 4012 wrote to memory of 3368 4012 chrome.exe 81 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 4548 4012 chrome.exe 83 PID 4012 wrote to memory of 1204 4012 chrome.exe 84 PID 4012 wrote to memory of 1204 4012 chrome.exe 84 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85 PID 4012 wrote to memory of 620 4012 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://rivaholding.nl1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff947469758,0x7ff947469768,0x7ff9474697782⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1876,i,7207628500712336287,7452325224575781943,131072 /prefetch:22⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,7207628500712336287,7452325224575781943,131072 /prefetch:82⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1876,i,7207628500712336287,7452325224575781943,131072 /prefetch:82⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2744 --field-trial-handle=1876,i,7207628500712336287,7452325224575781943,131072 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2752 --field-trial-handle=1876,i,7207628500712336287,7452325224575781943,131072 /prefetch:12⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4684 --field-trial-handle=1876,i,7207628500712336287,7452325224575781943,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3820 --field-trial-handle=1876,i,7207628500712336287,7452325224575781943,131072 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 --field-trial-handle=1876,i,7207628500712336287,7452325224575781943,131072 /prefetch:82⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 --field-trial-handle=1876,i,7207628500712336287,7452325224575781943,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:832
Network
-
Remote address:8.8.8.8:53Request134.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestrivaholding.nlIN AResponserivaholding.nlIN A62.84.241.83
-
Remote address:62.84.241.83:80RequestGET / HTTP/1.1
Host: rivaholding.nl
Connection: keep-alive
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 301 Moved Permanently
Server: Apache/2
X-Pingback: http://rivaholding.nl/xmlrpc.php
X-Redirect-By: WordPress
Set-Cookie: pll_language=nl; expires=Sun, 20-Oct-2024 09:02:14 GMT; Max-Age=31536000; path=/; SameSite=Lax
Vary: Accept-Encoding,User-Agent
Upgrade: h2,h2c
Connection: Upgrade, Keep-Alive
Location: https://rivaholding.nl/
Cache-Control: max-age=0
Expires: Sat, 21 Oct 2023 09:02:13 GMT
Content-Length: 0
Keep-Alive: timeout=2, max=100
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Request83.241.84.62.in-addr.arpaIN PTRResponse83.241.84.62.in-addr.arpaIN PTRsrv1a wittebrugnl
-
Remote address:8.8.8.8:53Request42.36.251.142.in-addr.arpaIN PTRResponse42.36.251.142.in-addr.arpaIN PTRams17s12-in-f101e100net
-
Remote address:8.8.8.8:53Request131.179.250.142.in-addr.arpaIN PTRResponse131.179.250.142.in-addr.arpaIN PTRams17s10-in-f31e100net
-
Remote address:8.8.8.8:53Request120.208.253.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request89.65.42.20.in-addr.arpaIN PTRResponse
-
705 B 757 B 6 5
HTTP Request
GET http://rivaholding.nl/HTTP Response
301 -
334 B 288 B 7 6
-
210.8kB 8.4MB 3865 6158
-
72 B 158 B 1 1
DNS Request
134.32.126.40.in-addr.arpa
-
60 B 76 B 1 1
DNS Request
rivaholding.nl
DNS Response
62.84.241.83
-
71 B 103 B 1 1
DNS Request
83.241.84.62.in-addr.arpa
-
72 B 111 B 1 1
DNS Request
42.36.251.142.in-addr.arpa
-
74 B 112 B 1 1
DNS Request
131.179.250.142.in-addr.arpa
-
204 B 3
-
72 B 126 B 1 1
DNS Request
120.208.253.8.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
89.65.42.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5fe634e700876284e8fee5bb0120912a7
SHA1453d16a522c6f2d78a205eb4ddbbdcd0c6269175
SHA2564c1cc1360f15f5a95b779f0ff668cf00a4190dcb930893ab8dca1c95f710d9ac
SHA512f55a84e78780342ba124d7c3754b06006c20ef5222dbde6491ba63da9f7d423f7ab0611ab3add73e466262830f11ac5c1f9cc3057fd7ba83e523fd8e0123676e
-
Filesize
1KB
MD5a4e3999d48efce49b52a7f39d6b698ec
SHA1aef33629194b251613d41e33f368b2c90c60e3c7
SHA256749e09c66990dfb7bc6aee1f54aaf0386fcf46f20889e18df3afcbc101ebb032
SHA5125a6813d99176ce16e2548cd6cfd1d792ffe7a153ef50e28be4cd640c42c9d3539cdfaba2f1eb6724e9bc259908f09e406544e266ddacf8b14a54424d052ba8e5
-
Filesize
6KB
MD5f8cc6d09acbc4195eaf2b8430eaf645e
SHA1099b1ee1391435acbf15fcff1d809412df8af4ec
SHA25665e4bfe2eb4323e436f1074031ae8a2e66dab953b6c17785628aebcba138f6c2
SHA51237fe6706a47779590755bcca9b9e929c0dee501c13ada35c050f38f2fccb4edc8cfb39ce103249e77c7e1812e83eeb52474d9ca129a71f605f10c7a2943d3e7e
-
Filesize
109KB
MD52c66298089604a34723011eba1101908
SHA1b77e89d44cd9909a8c7fd0edf6ee469a880b69c4
SHA25615a62787d04c63527dcc42140cd7bed00ee5e529ae655b68b2c5b0869dbd57b3
SHA512be88d91437b39b3cb0dcb7e8498fac8a2cad1ae7193108e5476897447c1cc7658abb77bfadb72c0caea40cb12beb24d56cb8969a0cf44f436adaf95a1f8fb8d2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd