Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
320s -
max time network
332s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 17:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://srm.nightmareautos.com/4AkYdt2349bfiB268jgdrnvmkxj14483OURKHEHKIDTRHAJ121683IRWD8832u12
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://srm.nightmareautos.com/4AkYdt2349bfiB268jgdrnvmkxj14483OURKHEHKIDTRHAJ121683IRWD8832u12
Resource
win10v2004-20231215-en
General
-
Target
http://srm.nightmareautos.com/4AkYdt2349bfiB268jgdrnvmkxj14483OURKHEHKIDTRHAJ121683IRWD8832u12
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133492097521551576" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 3928 chrome.exe 3928 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2092 1664 chrome.exe 88 PID 1664 wrote to memory of 2092 1664 chrome.exe 88 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 740 1664 chrome.exe 90 PID 1664 wrote to memory of 4608 1664 chrome.exe 92 PID 1664 wrote to memory of 4608 1664 chrome.exe 92 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91 PID 1664 wrote to memory of 1696 1664 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://srm.nightmareautos.com/4AkYdt2349bfiB268jgdrnvmkxj14483OURKHEHKIDTRHAJ121683IRWD8832u121⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffd0f7d9758,0x7ffd0f7d9768,0x7ffd0f7d97782⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1904,i,702460136435592531,4089806786423216826,131072 /prefetch:22⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1904,i,702460136435592531,4089806786423216826,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1904,i,702460136435592531,4089806786423216826,131072 /prefetch:82⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1904,i,702460136435592531,4089806786423216826,131072 /prefetch:12⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1904,i,702460136435592531,4089806786423216826,131072 /prefetch:12⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1904,i,702460136435592531,4089806786423216826,131072 /prefetch:82⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 --field-trial-handle=1904,i,702460136435592531,4089806786423216826,131072 /prefetch:82⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2768 --field-trial-handle=1904,i,702460136435592531,4089806786423216826,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ed05ecbd52cce9804e39d5a1aac605c
SHA1650a7e1d38c67e4cf375fc167722b38aa62b9b9f
SHA2560f5ea3c795d81c108c3b37dd321cfbde4faae8f23eb6c64235effcca36807392
SHA512428fc99bdaeae21b7d38de4f523c76b93bc80e8afe388c8c7bea5dcd1b795f36e78ec6255baee4b0e6a1120c820c53fbb3e7b5907227cc6994cb8d8d5394f259
-
Filesize
6KB
MD50ce50518d8a442ecf7854466cde85858
SHA1e9eef5f4cce93104e00a76a456cea5c64b464be5
SHA2567345a992d8aaa60952cf335050b5d6b8ad1d76a0e153f2e688a58000baf72508
SHA5125d37d8df055a14515cd26c49bbf21ca7710a0b83aaa9b6e8f3d8208c561885288681b5e482824342a06c2ba83797faad9c1b84e1bc4a4f962da49c9447d222b0
-
Filesize
114KB
MD53e04946c79d2a6ced79611ca60f046f7
SHA12fbf4ae34897b6cdc022ccc5d587a88984aa8f11
SHA25655177a6897d39e3510c1d60cd316f0a95f4be2f4d4fa0e97070380081ad80333
SHA5121c756cc14195aaf71232276b6cf0d6fbdcfffab2d737aedcd74fe85316a6b2cd6e2e8696f596c6e72d6c2b7ad2b5f8a86cfb46004a09f2702ef34c477d0522e2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd