Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2024, 18:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chromewebstore.google.com/detail/restore-old-roblox-server/aipkkddccajhejhkiefholbpknhmoaep
Resource
win11-20240214-en
General
-
Target
https://chromewebstore.google.com/detail/restore-old-roblox-server/aipkkddccajhejhkiefholbpknhmoaep
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528409261430410" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 4536 5080 chrome.exe 80 PID 5080 wrote to memory of 4536 5080 chrome.exe 80 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 2744 5080 chrome.exe 83 PID 5080 wrote to memory of 4580 5080 chrome.exe 85 PID 5080 wrote to memory of 4580 5080 chrome.exe 85 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84 PID 5080 wrote to memory of 1324 5080 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chromewebstore.google.com/detail/restore-old-roblox-server/aipkkddccajhejhkiefholbpknhmoaep1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xc4,0x10c,0x7ffc1db09758,0x7ffc1db09768,0x7ffc1db097782⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1804,i,6654920389300096051,6448101734524351921,131072 /prefetch:22⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 --field-trial-handle=1804,i,6654920389300096051,6448101734524351921,131072 /prefetch:82⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=312 --field-trial-handle=1804,i,6654920389300096051,6448101734524351921,131072 /prefetch:82⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3272 --field-trial-handle=1804,i,6654920389300096051,6448101734524351921,131072 /prefetch:12⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1804,i,6654920389300096051,6448101734524351921,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4472 --field-trial-handle=1804,i,6654920389300096051,6448101734524351921,131072 /prefetch:12⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3288 --field-trial-handle=1804,i,6654920389300096051,6448101734524351921,131072 /prefetch:82⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 --field-trial-handle=1804,i,6654920389300096051,6448101734524351921,131072 /prefetch:82⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2836 --field-trial-handle=1804,i,6654920389300096051,6448101734524351921,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5ce0b8d11a00256be872539d386e3f8e5
SHA164658a28b3b3a52c5332c9e1fdb8875411a4f9d2
SHA2563a009c2e78435c0b5f5454d3a39090a76111f8dcdb35ae665332afacb6f2d83e
SHA51206fd4d8b19f485e8fafabaebef5f48217d86ff8d59a1889e3a47bc28eaafb23892fe0f85d4e2165cdfbe70761fc006c0650e7304b2534960ee8962fdcef8cb4a
-
Filesize
456B
MD5df78cf6e4d160bebcd716aa23cd204e7
SHA1b9d0c6e7ebd8202b5b68e53142ef2323ddf1d239
SHA25636dc654360326083a2734a919f08f7134e9aa37886e9da5881e6256792dfbf28
SHA51280ee83d38e768507b3fe108f8c0f9640230c71c79e73e5cdf5ad7f7b18ba6f8f42dbefcd814c0565f94acf94c81cf51932aac08fb638d58faa23dc6a61f0f556
-
Filesize
4KB
MD53a515b7fc193de60d76d004064f31be6
SHA1c624c4be95044ff5e98abcea44ada68600ed7995
SHA256b7a2c89bc205f517201ae0fcc6701cdb47bc704409161ad36d2eee4dbe1e06cf
SHA512d20dd1af1455bb5366aa191be19978a6f605595fbd19cde83c7a6494f686df7ef67364cc8c099e8dbfd69b04d2751177772854c1cd4762698de562034ce3cc0e
-
Filesize
3KB
MD54b09349a2fca6b8e18f8860383713250
SHA1b953477ee0fce0111b21d675a8a134a7e0135ad5
SHA2569c29a077805baf9998bfeb884b84e33167bddc894dc466a43792d759b23574df
SHA512d1b78ed275be5a3951723ebd88ab655d797c855a326cb31c9137d85011a38a9fd580f1a7ef6215ab6175b5a167509d88fddd20306539b475a4ee3c98dddc94cd
-
Filesize
866B
MD5e308eabd54a1513d5679c8a222e145fb
SHA1f74fe1315730b99435509a9c7bc97684526aad97
SHA256d73d8c2493612501c86dcead2f82eabb32a88bb322a4fbcdab0d402d46288dfb
SHA512a5d6de807d8ec066038669313750fce7698aca1fe82a56d4f902fec05b09c5b410732bd3247d1d92199d7eb85d1e20c4fbaf7cba9354017fc192dee9a9935f34
-
Filesize
6KB
MD5a7d75e534cdcf5d033288a4193abedf1
SHA179f768ab74cca06aec90660b312faff198294d53
SHA256ab75687991a4e9486ad6f1afd1592bb527c98b7ca8db682db99cc31b3e2e9265
SHA512dcbed9a358032cfb6fa878ff7224a4b140a96d035e26b79b8f4a2fd89bde57f4c277de4ae24d2b999e0a5a589d1ea2d74f89e6317764c769a96008fa53f5a7a8
-
Filesize
255KB
MD5faf35223b59fde57458cbc289e721f56
SHA15e057e83cac7c4156fc34571645c0b6cc31f7d64
SHA256b11eb21839c21a6d1c57ff8285129c2a75bf30900920d0bf7960e911d7b1251f
SHA512629b45144dfa3a60fae722440b4a6044813ce98ebf5d9dcf51b7745b097de3e9b6f62cb991be7e1d9463016023f0822f09b1f1a8177256c89330ebd33cf21b94
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd