Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 12:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://torrent-stats.info
Resource
win10v2004-20240221-en
General
-
Target
https://torrent-stats.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532518567623738" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3840 chrome.exe 3840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3840 wrote to memory of 5028 3840 chrome.exe 85 PID 3840 wrote to memory of 5028 3840 chrome.exe 85 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 996 3840 chrome.exe 90 PID 3840 wrote to memory of 1896 3840 chrome.exe 89 PID 3840 wrote to memory of 1896 3840 chrome.exe 89 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91 PID 3840 wrote to memory of 4656 3840 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://torrent-stats.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5f3e9758,0x7ffe5f3e9768,0x7ffe5f3e97782⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1912,i,6501964697207431398,4758506229761555628,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1912,i,6501964697207431398,4758506229761555628,131072 /prefetch:22⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1912,i,6501964697207431398,4758506229761555628,131072 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1912,i,6501964697207431398,4758506229761555628,131072 /prefetch:12⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1912,i,6501964697207431398,4758506229761555628,131072 /prefetch:12⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1912,i,6501964697207431398,4758506229761555628,131072 /prefetch:82⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 --field-trial-handle=1912,i,6501964697207431398,4758506229761555628,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1912,i,6501964697207431398,4758506229761555628,131072 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 --field-trial-handle=1912,i,6501964697207431398,4758506229761555628,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=996 --field-trial-handle=1912,i,6501964697207431398,4758506229761555628,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53b29bcc8a066c49dc8c027e82f680453
SHA1ca1974fd46b1b7688acefdb471cdd30b858793d7
SHA256c5a8ec09b01bfa506a337434891d2cc5510ea064123851b98eb73e2ca9f0dfb1
SHA512cff2a75d426db83bdd7b2839aae3cef41a9454926d458b1ac0bac05e3d4676c30be8af78e20436bbda34f168d90c5b9dac95a6e74de89679e6908894f96d647a
-
Filesize
6KB
MD56398a27cc4ce9deb2cf590118205543d
SHA18f98f65cff80636b0d216400f48c05d1d2a58a93
SHA256ba9b1d0a1ae02c55798c73a6af71698616cbff3719eb44a4114fcdb323501ed7
SHA5121bd4edad08108ad7a8a4aab95a0767422726e6c2e76e04424a05517922d8c3f2a433f1aa0e1cdcfe41d85b3ed0d585e56aed60bd908e23c4d7e789030141f64d
-
Filesize
132KB
MD58c62a108b955a25525b078d9b5929131
SHA1e7774d095dfc9eca640a0c251709dde53f60da3b
SHA256c7ebbb8e7a1eb85e10dc02f83450dc860c7d9f86ac4feb1a6604a63e2811b409
SHA512caa5be0eb41b4b0f85b905a3435357aaa099b823a30f32fc2565ec30a545c574e6285689a0f9d0460f7ca5f7960fc9665d7837842df821e1673762064fe76288
-
Filesize
158KB
MD5d35e409d685b3d0311359496fab9fbb1
SHA15754b7b42f9ee647f27a80ce09026681c1a3c771
SHA256863d4fb40285ea274b354129ce19eaf2b337b9809a938760d81c0f0236d00dcd
SHA5128cea858bf6515996a26be3bda8c633917525f091d931d4ebafc12d679bae32eab722237444ecf1001f27a5e2d15635995523ae1daf28fbf6ecf91382dc771af6
-
Filesize
131KB
MD511309dfccb7fff3f07bfcbe8777f6c7e
SHA12c5b7927d2f023cdc58ac0aa98aa62a0fa68e6d4
SHA2561a1dc3d17aa7ddd0528fab07fe24514aeca48ac683005f1c6013750e8498cab7
SHA51284b17ec41a7e3e4b55f82b15d25383b30ee59ccb066a488b533634063105c15d199999f7bdcf5f5771c98362c7b88d18f465e643c3f94c6ba6607cf4d1a0496b
-
Filesize
131KB
MD5216d12d1f3149f8a66e28e0abac1aec0
SHA1dbf9040a4d64cf976ebcf2227816f3e4a2eb67c8
SHA256fbea97542cf17c1776948312337ba4a0c8963f840e246a4cf6ac43e7b1d4cce1
SHA512ba48d0da54949e3c0e719539ef05f35217a4e572206298dd70d5e45a8a15265f16a23e3d6198ddcf3344077fabe9ed17d20ad114bc2ef00e4f66435ebc18ee06
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd