Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 14:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://custodycraveretard.com
Resource
win10v2004-20231020-en
General
-
Target
http://custodycraveretard.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133447042753140218" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3668 4868 chrome.exe 70 PID 4868 wrote to memory of 3668 4868 chrome.exe 70 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 672 4868 chrome.exe 92 PID 4868 wrote to memory of 1916 4868 chrome.exe 90 PID 4868 wrote to memory of 1916 4868 chrome.exe 90 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91 PID 4868 wrote to memory of 4972 4868 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://custodycraveretard.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe0d7a9758,0x7ffe0d7a9768,0x7ffe0d7a97782⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,11903155354956004720,10835320944358163538,131072 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1884,i,11903155354956004720,10835320944358163538,131072 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1884,i,11903155354956004720,10835320944358163538,131072 /prefetch:22⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1884,i,11903155354956004720,10835320944358163538,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1884,i,11903155354956004720,10835320944358163538,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1884,i,11903155354956004720,10835320944358163538,131072 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3032 --field-trial-handle=1884,i,11903155354956004720,10835320944358163538,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1884,i,11903155354956004720,10835320944358163538,131072 /prefetch:82⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD547bea9b236a9b87d8f54497fdd03d182
SHA1873b6dfe72d73cb68efb0e77420ddf4d4ac353d5
SHA256d83d32f42951f80bf6b33b36c63556086434ef69fea58276029c9b2ac3767dd5
SHA5124d650517a7f2c5cea382aa03c1316f63e5ed76be8d71e7deadb68001b26970de83efc546fbff5f7bcf6142231112083807d5090e81081f736955b39093989a5c
-
Filesize
6KB
MD535b7ace8405618e1913355820d00974c
SHA1ca8f0da005a6b92769c3fdcb1dc6ba4f0b3c40d2
SHA256fba6cda139608b0a473e252ff8590d281bbdbf74205c7aef8d94228fc5eb7ca0
SHA512f7e21deed8de12336d43b5120c28b112d96d360ae38b83f693bc2132c4aceffbb8c4b3500bba49b304fa712bba5a7dc8e117a56c61ed2a2cbaf50b5f223ee8db
-
Filesize
109KB
MD51bcd06eb5ec376830e0cf8dc82fe20c9
SHA16f1acc3421ab3bdfdac258aca1153ad140fa22e7
SHA256c306c78f38c968fd3df78809e8db1187277da89908da45fa9dd1f13a6513474a
SHA512fe555c7479107937845e6a63060fa6bc3ac8bb76be6d6dab417c44c4759fedfd9e284cfe6ab5edbfe2341fe81a56540cec74eb0f35144f69cd384cb2873961a8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd