Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1816s -
max time network
1706s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 20:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://discord.com
Resource
win10-20231023-en
Behavioral task
behavioral2
Sample
http://discord.com
Resource
win10v2004-20231020-en
General
-
Target
http://discord.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133429970318502633" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 4596 1992 chrome.exe 21 PID 1992 wrote to memory of 4596 1992 chrome.exe 21 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 5104 1992 chrome.exe 88 PID 1992 wrote to memory of 2084 1992 chrome.exe 89 PID 1992 wrote to memory of 2084 1992 chrome.exe 89 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90 PID 1992 wrote to memory of 2580 1992 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://discord.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd29d49758,0x7ffd29d49768,0x7ffd29d497782⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1876,i,8348321588322009465,6839410198436620914,131072 /prefetch:22⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1876,i,8348321588322009465,6839410198436620914,131072 /prefetch:82⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1876,i,8348321588322009465,6839410198436620914,131072 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1876,i,8348321588322009465,6839410198436620914,131072 /prefetch:12⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1876,i,8348321588322009465,6839410198436620914,131072 /prefetch:12⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4612 --field-trial-handle=1876,i,8348321588322009465,6839410198436620914,131072 /prefetch:12⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 --field-trial-handle=1876,i,8348321588322009465,6839410198436620914,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 --field-trial-handle=1876,i,8348321588322009465,6839410198436620914,131072 /prefetch:82⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 --field-trial-handle=1876,i,8348321588322009465,6839410198436620914,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD58234e1e5a9e003fadd11869e5de56166
SHA1e666493067da3da83ebae0837693ea963523d93c
SHA256a917c6a9c22350b4a3b1904ac0f38985309b43f707787fde1f48e12bef7c590c
SHA512ec1814fbbb62825a1c54b2e8d5aa9de445fed4697828d057ecf3d9bf436f6423f7047adeb8ed88aa35d9891478f4b4265738f66733f260812c2f854bf7b61c48
-
Filesize
2KB
MD5021b99515737052a096921a9f2a13120
SHA1e6b7a7dea5b20b9123e5449876b573c0869893a0
SHA25629e6dc2937386d7f03c2be3cf12ad9f49d330588c1872aafb0b77513e3587394
SHA51222c296cb244ae146301da62137f28b06f2fddccd34cbe6ca35a1fb16422ebc48e425f15a9eaf9d01310c45a62cbb925d00614a625d74022fde4deccf99663bf4
-
Filesize
1KB
MD5d6f907d3963de9c0457cb13161ec308e
SHA1962eb46d94bb05b8d8ef7ab448ee3de707693ae0
SHA256f668a7657e8b78a68abab76f181d3a4a14225fb95e5ac7977fb6a65b74bf7399
SHA5127e5598220dd87159d25fdb9aa3318cea9f4e3cf4d3a31f1797db879cdec8e098235814bc543e4b4efac2a887e195a99b84dc13ae859af369a8294d82f98432cc
-
Filesize
6KB
MD51c5605d6f657e88279e3c64e5bf3c1b7
SHA16abe371d745a97cb1131ab5fd946bfd0e6da921e
SHA256c6a441d079e705e27c63a5546bf65d996c96707e22f82e1b3ed5bce75fe33b03
SHA5128a4b12b9b7a455c99aa5f623e4d542312d2415475b40e6d0b0e03ec5dc4859bf2e887ce05fbb0bcaf5654af3d0840c9e1b442219bec11c1e60ab61dad51ff6d4
-
Filesize
109KB
MD542346bbe0bb196dc3ea2cb6bf5c03573
SHA1af9f53d74c0b3680fd1ab6e6acb2c3133aee377c
SHA256ba53eff2362471f01659eb08047118f9654ccfde1e4503bed4d0ff9d71a34f63
SHA512c11a3978ca52921f25137fc907c101e1fda94587a0f3aa6026f3879d158dda78f09609be2f6fb126a32050ca3ac4f7f3e54290d7871f0b5d6bcc7435d64e7920
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd