Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
85s -
max time network
87s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2024, 22:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.blackhost.xyz/?id=vm
Resource
win11-20240214-en
General
-
Target
https://www.blackhost.xyz/?id=vm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528539897644565" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 2180 3528 chrome.exe 80 PID 3528 wrote to memory of 2180 3528 chrome.exe 80 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 2320 3528 chrome.exe 83 PID 3528 wrote to memory of 1312 3528 chrome.exe 84 PID 3528 wrote to memory of 1312 3528 chrome.exe 84 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85 PID 3528 wrote to memory of 3056 3528 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.blackhost.xyz/?id=vm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff95bf9758,0x7fff95bf9768,0x7fff95bf97782⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1556 --field-trial-handle=1816,i,16728703744944732084,13026272936606118108,131072 /prefetch:22⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1816,i,16728703744944732084,13026272936606118108,131072 /prefetch:82⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1816,i,16728703744944732084,13026272936606118108,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1816,i,16728703744944732084,13026272936606118108,131072 /prefetch:12⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1816,i,16728703744944732084,13026272936606118108,131072 /prefetch:12⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1816,i,16728703744944732084,13026272936606118108,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1816,i,16728703744944732084,13026272936606118108,131072 /prefetch:82⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5044 --field-trial-handle=1816,i,16728703744944732084,13026272936606118108,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3788 --field-trial-handle=1816,i,16728703744944732084,13026272936606118108,131072 /prefetch:12⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5afb6297e47a7f1bbf03b023315d67cc0
SHA1f5bcf648c29019bb5fba817721b5443c98bc389a
SHA256de365343b08786f6d3d9c1db68955d50d9dfb527b46736e8cee92590ad008a21
SHA512d3b0aea42a1ce9b9cf110e57f499c0e95998e02b5b8fe4a3a10c03bf7978bc6b9469423abc8b41f1b915ff1efb677c0b440ad1e8509422726ef456e9538e91e1
-
Filesize
538B
MD59f3a27d6f998c4dac4b71a5ff9f4052d
SHA19bfa7229494031d35add74cb5bf7648b3e3d34e9
SHA256b9d7451ba4beab92e1eb98ccee8e5406b8a61262c4892b02f2f5c5cb368610b9
SHA5128a7671d23b702888bbd058838f4f9fc8224c6e2309e23d9b7a116a9e68b5a892b9edc7eccee1499ac2ea0eb1333db6ab0c5ac997a730908c764be29edcb7a723
-
Filesize
538B
MD5727d51212ecc26d9e2312b6a06bc2cb3
SHA1ef47b1016c1f99089a698e8fcd87eac3f9f89465
SHA2561acaa873b154478af55078288bb61408dfeacf53deab5112daf10ae139b8dd4b
SHA512c9d59de8d736f84d8b3ebc770673041ecfd3bdf26c6c339ab51892b586417f754d69b02afd0317f284d2181fd5f94e4b833dafb2489bc667d7a09c54a6ffed6b
-
Filesize
6KB
MD5e0019dee1d226fb9f3343ca0df4fa211
SHA16b5fad538ec4478336657104dea3e36ee9766d91
SHA25616b8326a97e74b6919d1e3835f6a420b179933e9e757a468292b2eff0f179eb0
SHA51289c80dfa1fe6340c6e1db86e47d284fba378839607b28ec7ab7552a592155e64031c9373b4ec6454eb8d7d8b04405f39bd3721ada15845bbf0f842189ab9ae44
-
Filesize
6KB
MD5adb22704e9e8cbb7389b3b0f17162eff
SHA1c598a63b56e89995fa08e55d882952a282808706
SHA2569824ffb08274551c417f32e741e31bbe05edefae18b2d75f281f4dc1719332d8
SHA512f378e47c76f3ef0003dab63698feff6a3742bdc44449a56d8e7678e64ccb7fdca7c6a149253934949f9aa54860568ca757afdaa3ed2c84213910658a25624e6f
-
Filesize
6KB
MD51f9b3c8801c90a5aa4ff44acc3871129
SHA103eab763c95af5fa3e6d9f65e7ff300fea7fd98d
SHA256c03c71c6d3aa85eb2a740e3ed57f0761b7110593828b36172d7d4d9cbd8fb50e
SHA51266823853aa82f9ac0f7af7592e24567e25a2ea4f81af8835baf2aaf339cdd6644ed7ff8864d2b4e781923a4ead2ed7a0d1974236372d644bf60652146d9e631e
-
Filesize
6KB
MD5232305e64630ff84009641ed0b0d6cf8
SHA106275517fc70c40795d095c34d30440ac32c0611
SHA256c76096588bb6514e0f7cddf85590e0fe8347b2fa4b764ca2ca570761c36ecfea
SHA51209c8df31e02e279e14e66c936637e1c07b7a33cb72362fea9d82fb6717cac44984cb2d782b7f2b43e50bca9c1ef7ea447cc3eddfca51bcd19a15a067b54fc22a
-
Filesize
129KB
MD550ff505a2d437f820681ffe39bf04600
SHA15d345d78a3b7315841d3a0e68912c9c7adb894ea
SHA2563b27cbb13b2c3d0ec03ded53f86f9081a276abe56b18ef9802fdc700ea2189e7
SHA512f7e12d68c7f15139ba5260b5ebdca4ea8eb32a214141f825bcfb99a1c8ebf94a616f693e0ca36a76731775325bdc616425d6f4978d5e1a8e21f6e369b0d1d0e6
-
Filesize
129KB
MD5f1d8b0a0cd4a5ebc8cb394d74efeefb9
SHA11f07685a017edea6223eadc40552b55b6714675d
SHA2569fc58401d8ad6b6fb02e871c16dfa110b49af049dc586f465f8139c6faee7a2e
SHA512f09e02ddcea7d86481af011221d8c9876703dfd7ff11e3b9b9daaf4ff28647fe72b12d8a7779d2695bd1e3a6a25e7c7c1b6a844cf357a4ce7eb3ce0a171f8956
-
Filesize
129KB
MD56335cb0398be8cbd9771ce486c915cd6
SHA12210a0dfc7aec88dd132becef8334541868435b3
SHA256912ddb5314d932fe797e7c72bacbbe39ebbc6fb5f820ce15654181330583c1fe
SHA512ec7b3ff8777944843bcb4287a1d886f9827a03908a1ba98f464fa716a6ad5b01664a50a06cdcfaee172d8eec2483ae398a3f9748ce2418ec9753551ed9543858
-
Filesize
264KB
MD55884f2d42d83a1febd4a75bab414a895
SHA1f00da1edec569d4ecabe619f128a0478148c1afd
SHA25607fb8d58c2b61d2b4b1257e7b7398a6ec8dd7fe6ef97ebc059162ec56192e83f
SHA512f3f23f25bbf13b184eab28eb8a750dd3d375749d2b4fac646fb04937da9b9bf16529997b2e29c96dfc6bfa5c76863be60891a821827781662fa09e1d02cc83f8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd