Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1835s -
max time network
1806s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/02/2024, 11:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/scoobyluvs/Fake-img-logger/tree/main
Resource
win11-20240221-en
General
-
Target
https://github.com/scoobyluvs/Fake-img-logger/tree/main
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 16 camo.githubusercontent.com 17 camo.githubusercontent.com 1 camo.githubusercontent.com 13 camo.githubusercontent.com 14 camo.githubusercontent.com 15 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532486258557250" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2764 chrome.exe 2764 chrome.exe 4372 chrome.exe 4372 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2764 chrome.exe 2764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe Token: SeShutdownPrivilege 2764 chrome.exe Token: SeCreatePagefilePrivilege 2764 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe 2764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2932 2764 chrome.exe 73 PID 2764 wrote to memory of 2932 2764 chrome.exe 73 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 4532 2764 chrome.exe 78 PID 2764 wrote to memory of 3536 2764 chrome.exe 80 PID 2764 wrote to memory of 3536 2764 chrome.exe 80 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79 PID 2764 wrote to memory of 2540 2764 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/scoobyluvs/Fake-img-logger/tree/main1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdba8f9758,0x7ffdba8f9768,0x7ffdba8f97782⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1816,i,16266719004585609209,17984161998289727961,131072 /prefetch:22⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2140 --field-trial-handle=1816,i,16266719004585609209,17984161998289727961,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1816,i,16266719004585609209,17984161998289727961,131072 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1816,i,16266719004585609209,17984161998289727961,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1816,i,16266719004585609209,17984161998289727961,131072 /prefetch:12⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 --field-trial-handle=1816,i,16266719004585609209,17984161998289727961,131072 /prefetch:82⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4504 --field-trial-handle=1816,i,16266719004585609209,17984161998289727961,131072 /prefetch:82⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5852 --field-trial-handle=1816,i,16266719004585609209,17984161998289727961,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e1f95fbe6622fa20a8db95a9446d88be
SHA1df2b73c4e6d97524e0c30085c5f3325b64ec4e29
SHA256c75871cd0bb1d019ca7d92c8478b135982b577d89604c14bfee6a12f0c85fc35
SHA512478e0c080c3c9adaccd7a30ecb4568f9657e814961e5dae0b981dfdababf53853dc7a3969b09fb49b5a4b7996289c69b44471f289965723638d26b66543cc6ce
-
Filesize
1KB
MD590eeeddde5e95e01b520319f7d42da8f
SHA150c247a0b8090f0539b58d0f5b8a2796482be8d6
SHA256be80c6db0be39b8dd012c1073fdd197a016aaeeba68012dce519781ed5aa40d7
SHA5129edfbac4dd4c72b987a998e465b1b28f29808391fc3c5e9245c9e837da320379040e57d58e413d5b245c59b08f2ed2fa8433ef3208dfa879a3965decce12fe2c
-
Filesize
1KB
MD547037570d4d157cff221af73d96e3e7b
SHA1b0de76ef2dd654c850eca815017fde8506072900
SHA25685143819e480b54dcb7aa6e66ff870065c4e2a433a20dc450dc6ac246a1f2178
SHA512bf13a4a1c89df575e7ac4304d2963007273bb631ea841a586445c028d053bc45f3a9ec02408f38d4cea09762c25d01bb81d4dce6b3e614fe38724be8fc4a5b0c
-
Filesize
871B
MD519c0cc3728a7077023291719082936c1
SHA1b95736cb7c57383e6e1277b46dda28d65c4c4644
SHA25617fa000558fcc2f1fc93d89127d97ecc3db90d1b5924e9274b5b530f7b252a8b
SHA5120ffddb8c29f7e28d96b7e19736270fc120cf7da16db2cb07d8d081b0416e3e74210b9e3fb9930471f507b5f1f1f13330380304ec3745a2e652394e5981cdbc46
-
Filesize
1KB
MD53dd5aef6b4922360596c509d74fd4479
SHA12f1b06a792f40799a53992779fde40f7d3b5b0c9
SHA2567907665a3970b7680cfa2437097f765974145df9c3e66f09c6d10c4e5fce45ed
SHA512693aa13e70751d33d6a787fe84d49029eaa61aa4caf273d134ba8ef1145ca10c88893c3dd3e228c8b8d1437d761a99bd371e7e4d2b11398615eff81dc57c66d7
-
Filesize
1KB
MD582a9348c83e8100fbe59dee5ab35bc9d
SHA11812c20793b46e0343a3c7f29a3708291936db70
SHA256cd217c31e3b93635d2694075f6271d4c78b4ffc4c1b21233d4fe3b82b901c634
SHA51230bf6a05a3e99c089951eb344de43fb6311cbd905d0101fe229fa0af0ea44f5e59e1cd84d07195e720d8c620e65e08d845b52052da56c9797caee48c31b20e88
-
Filesize
871B
MD5bca55816bfbf5617aa39181a39828ea6
SHA15fadbafce0a4bd04f0d3f50995714ea236f1ce27
SHA256e58981ec0d2708f627fa16127576f2886db36da9d61b8fb6b84b779872f22eb7
SHA512022753313abd4c54a73fb9aef368d90e86c119467d010460618bc500dddb56b8c18023c76b6165c574b29ecf9775013d5dc6e85518806f22ae37efd10be5269c
-
Filesize
6KB
MD5c32e511a35df20ea6a894fa1d5a7a7c5
SHA144c52e3a7536285c76805003eb522272d9bf9259
SHA25675e56eaa757fe8e11b77cf0d391e8036bcfd023596b72aedad694b71303f76a0
SHA5126ad359f57f96ce613a14b31124603a542a869376e64d0d196a9df4e0811a23c222c7214b1184f020564b2bc6bc7bd20290828ae9d90083270071b9df2e37aad8
-
Filesize
256KB
MD55f13a2eeb7537cae12c830af46a97fe3
SHA1dc5642dca6c50c7839f5f725ef34fba62056c02d
SHA256a5dfb043d2978a80db6743e0ed2023ba6ffc3fa5bcbca35fa38393b815a9116d
SHA512ec46c3adf769586ca2eca4f24599f6b44c3e90d8c7162b0cb288e7ace7efc52499dd2023f9f60e1fb512615f7829d51d4f3bf5ddc1a3d400768a3a7e15869afe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd