Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 01:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dcs-web4ato.online/
Resource
win10v2004-20231023-en
General
-
Target
https://dcs-web4ato.online/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133431892499806018" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 2328 chrome.exe 2328 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3688 wrote to memory of 2560 3688 chrome.exe 54 PID 3688 wrote to memory of 2560 3688 chrome.exe 54 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 3160 3688 chrome.exe 90 PID 3688 wrote to memory of 5096 3688 chrome.exe 88 PID 3688 wrote to memory of 5096 3688 chrome.exe 88 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89 PID 3688 wrote to memory of 3240 3688 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dcs-web4ato.online/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa97029758,0x7ffa97029768,0x7ffa970297782⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1868,i,3895621035236024863,6893793000436135906,131072 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1868,i,3895621035236024863,6893793000436135906,131072 /prefetch:82⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1868,i,3895621035236024863,6893793000436135906,131072 /prefetch:22⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1868,i,3895621035236024863,6893793000436135906,131072 /prefetch:12⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1868,i,3895621035236024863,6893793000436135906,131072 /prefetch:12⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1868,i,3895621035236024863,6893793000436135906,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=1868,i,3895621035236024863,6893793000436135906,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1868,i,3895621035236024863,6893793000436135906,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD59698e081e9fb8c00b32f00353c192c9b
SHA11cb769670087fd958812f97f7270bfde17868595
SHA256bd1def588272569c095eba33d4a5474fe6d4ea5db43ad88707bad7a3e4f8539f
SHA512d1bb64198d2a5ef511f36ed0e8faa4f320bf4a82d256cb414a7888b7d88767c4c1891b5d7db70e7d83f7ba9ab36566d016abaac85b4acc841893f34fb04b7dea
-
Filesize
2KB
MD55a6f1c939d518183a9d574a3bfe78b44
SHA1bd4607054dc05511228cab869e37797374557743
SHA25625c1e03c24f5b0002b4c4fe021e476c6f313b8347ebc832758e40a2a0ea75c85
SHA512f475ef8be656959617f42b75274a59b2d70e19e140a6ace867f97f8708595e10fe74d6e1aa7c3a6c5f7c3517c0216989a899723395739c6a252ee2fac9a4b3b9
-
Filesize
539B
MD5306d03b3e857fc7d6ac7cb34a2e268a6
SHA12c8f6c47f4e2edba58924236b2f29c42d0e3ec77
SHA256247f81bdb9a80b0e992bc692cc6d5f7c86f005f288a8d9b0f39103dfde756f33
SHA51264d3ea8a26e52312647350c863140613419d00ac19bdc0e587d7e08992efec47513108a18627eae78f3d0f8dddf86266325f311a61f8a323ed81c10436319993
-
Filesize
6KB
MD5820695dee5b02fd8bd1df41fa58e54f3
SHA110f19e0d1552ca282e3145705bf965b2f0ffe1a9
SHA25678a4c9eb7cb650af062bc3ef7d74ec17a1343e42872d5275653831bd3a778528
SHA512703aa26b122f191907f1f67f1dafd06a2359a25b32684a87275ba3c60920092bfb4167f5f4efbd70cc20e804cd5d3428ac172e5c3a361158def4e9475c6b7786
-
Filesize
214KB
MD5899c26472d5e63f58836fc68575788b9
SHA119769ba0e7d98e9ef8805910fd26abb6363a6712
SHA256e0479e500e9691c039558777f07b73ae4a159bd53663c69ef209cb7da8dbc741
SHA512e929444b80afbe53f40bcb5150fe1788fe2b51daa23bc966df21ceba80882afbb660fbb769b800e7d37abcda2cea0b66896d17a638f0252cc5b43f591aeb1f7c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd