Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
85s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 13:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/ScriptTestAdvanced/STA-Chat-Bypass/releases/tag/v1.0
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://github.com/ScriptTestAdvanced/STA-Chat-Bypass/releases/tag/v1.0
Resource
win10v2004-20240226-en
General
-
Target
https://github.com/ScriptTestAdvanced/STA-Chat-Bypass/releases/tag/v1.0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5436 Script Test Bypass (Chat Bypass).exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 142 raw.githubusercontent.com 143 raw.githubusercontent.com -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\STA.Chat.Bypass.rar:Zone.Identifier firefox.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3496 firefox.exe Token: SeDebugPrivilege 3496 firefox.exe Token: SeDebugPrivilege 3496 firefox.exe Token: SeRestorePrivilege 5940 7zG.exe Token: 35 5940 7zG.exe Token: SeSecurityPrivilege 5940 7zG.exe Token: SeSecurityPrivilege 5940 7zG.exe Token: SeDebugPrivilege 5436 Script Test Bypass (Chat Bypass).exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3496 firefox.exe 3496 firefox.exe 3496 firefox.exe 3496 firefox.exe 3496 firefox.exe 5940 7zG.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3496 firefox.exe 3496 firefox.exe 3496 firefox.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3496 firefox.exe 3496 firefox.exe 3496 firefox.exe 3496 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 4556 wrote to memory of 3496 4556 firefox.exe 90 PID 3496 wrote to memory of 4420 3496 firefox.exe 91 PID 3496 wrote to memory of 4420 3496 firefox.exe 91 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3584 3496 firefox.exe 92 PID 3496 wrote to memory of 3440 3496 firefox.exe 93 PID 3496 wrote to memory of 3440 3496 firefox.exe 93 PID 3496 wrote to memory of 3440 3496 firefox.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://github.com/ScriptTestAdvanced/STA-Chat-Bypass/releases/tag/v1.0"1⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://github.com/ScriptTestAdvanced/STA-Chat-Bypass/releases/tag/v1.02⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3496.0.571515096\1211215526" -parentBuildID 20221007134813 -prefsHandle 1868 -prefMapHandle 1860 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {300a9e40-0069-412d-89c9-d65af9866706} 3496 "\\.\pipe\gecko-crash-server-pipe.3496" 1944 1a4eb3d3d58 gpu3⤵PID:4420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3496.1.1177430403\1334714463" -parentBuildID 20221007134813 -prefsHandle 2384 -prefMapHandle 2380 -prefsLen 21565 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f1425dd-d642-4c47-89d7-6b7b994410ae} 3496 "\\.\pipe\gecko-crash-server-pipe.3496" 2416 1a4d7772358 socket3⤵
- Checks processor information in registry
PID:3584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3496.2.494551326\734970075" -childID 1 -isForBrowser -prefsHandle 3132 -prefMapHandle 3164 -prefsLen 21668 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1be33fb-3b9b-4c93-ad0a-4ee8889ac0eb} 3496 "\\.\pipe\gecko-crash-server-pipe.3496" 1672 1a4ef529258 tab3⤵PID:3440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3496.3.1053338027\386545482" -childID 2 -isForBrowser -prefsHandle 3664 -prefMapHandle 3660 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e616c44-0039-4fe2-953a-74aa24b0039e} 3496 "\\.\pipe\gecko-crash-server-pipe.3496" 3676 1a4d7762f58 tab3⤵PID:316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3496.4.216978715\274390449" -childID 3 -isForBrowser -prefsHandle 5004 -prefMapHandle 5024 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0abe62b6-7d7d-4eb7-8964-8c2040b27736} 3496 "\\.\pipe\gecko-crash-server-pipe.3496" 5000 1a4f1e79258 tab3⤵PID:4312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3496.5.1755560635\524888556" -childID 4 -isForBrowser -prefsHandle 5140 -prefMapHandle 5144 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {34561871-5e36-476b-b3d5-630b7a12ba4f} 3496 "\\.\pipe\gecko-crash-server-pipe.3496" 5240 1a4f1efde58 tab3⤵PID:4260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3496.6.1638858047\168475409" -childID 5 -isForBrowser -prefsHandle 5376 -prefMapHandle 5380 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84ce9cc9-3879-46fd-9e26-cf5991f16eb9} 3496 "\\.\pipe\gecko-crash-server-pipe.3496" 5368 1a4f1fe1a58 tab3⤵PID:3456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3496.7.1896681639\2018901060" -childID 6 -isForBrowser -prefsHandle 5412 -prefMapHandle 5416 -prefsLen 26765 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {17c42910-f949-41c8-b41b-f6bd376b506a} 3496 "\\.\pipe\gecko-crash-server-pipe.3496" 4768 1a4ee3d6d58 tab3⤵PID:5320
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5836
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\STA.Chat.Bypass\" -ad -an -ai#7zMap16765:92:7zEvent320891⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5940
-
C:\Users\Admin\Downloads\STA.Chat.Bypass\STA Chat Bypass\Script Test Bypass (Chat Bypass).exe"C:\Users\Admin\Downloads\STA.Chat.Bypass\STA Chat Bypass\Script Test Bypass (Chat Bypass).exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gaix9yhh.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5940b8194c2034df86f9ded9d9fbd9634
SHA1ae99ceca8771ee9fd904faa19292a3f80d78117c
SHA25679a1e04e739f66b1d0fb665d5785944b9ca8597500fff11e437cab9ab05ded54
SHA51256df61f0868511ca2b1ac48cf80369d7a1b95c61cafc26111fdce980e5db41682d6fb5612beded0e61d1b9fc976bb97237e48cb69ac84bdc8c0a816a2b43f25d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gaix9yhh.default-release\datareporting\glean\pending_pings\94af4358-0077-4ef9-bb90-8280e282d953
Filesize12KB
MD591e89a8bd40bfe3a7c056adfe2d0a657
SHA163420ec034e5f22c5a92f90ba03dceeab1829a22
SHA256d4d7141051d6fde465ad6b20a5d3f03c2dfa4fe83633f10af539e758f02a3237
SHA5127139d42b2a8cdc9ff0e536e8949aab449749fe5b3137ce6280a73a8372129b3e9036a3421eabe4859b3c62231c471f5d04d2b42feac1f2bb64b8d970f6857cfc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gaix9yhh.default-release\datareporting\glean\pending_pings\a65b9724-5b58-4875-9e9a-136668960702
Filesize746B
MD5e6f1224d11a77a3a6ea3c9ec6c15fbc4
SHA18bbf52f39e1513705339de0cb540f528dd8ac458
SHA2564ea149b73f34c8f86c56696cfb4b85ca4dc4f03949a237e942a6df2575e51b6a
SHA51298e3d1076edc86e204ee39c360c97e2ad7bc37008c03abcdb3d456f4577cfdab3ebf1175dfebc658da31e073fe4c890f74f0d52df6ed8684c247876eaff19560
-
Filesize
6KB
MD50ef2814707ac8247a3f03027123dbf0d
SHA12728722763237f7fb8642ca7ea86bb4a205bb328
SHA256b2910f7eb5645a272379c7c2ed3d7bcea54e38b1a0447bc4029e3a1765094c6c
SHA51212a34d4a0ce3e80ae9a83275d7d648eb15d1f5b209b7615ae76c8d164c79da582f45c9b92d6661e90517261351ac5a27032be9cac5ef295f65690bcefc96dec1
-
Filesize
6KB
MD54296f037007bf15f1252e1726cfca0d3
SHA16286f131a0ce30e46d37dea6fc603e64cd10782c
SHA2562e8f6ea3948bd8f654e886534af9aa27db42da3c04cf788d565401a6127b4e18
SHA5129ae518522405866800c905be0510bd99b66b0e5481b334d3d5d2f209246c5ab842b7cbadf17b78d2222529b973934c09bf656d9e3b3c846b992d3def969ae13b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gaix9yhh.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD55a88608ef171de6573216803548e2980
SHA10068065b1b12ce62e49587d8075a8a0dab974639
SHA256302211b90604f151b217691cd55d5543335f3e9dcc586d9fe979e1138327d0f0
SHA512f44d39508cc40f119be8901be04bf91719a24e19f428b0ff05470487b09ed804a9728791218df685e8e730100f2bc77f979741b73f2c514daf296d1e970af23b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gaix9yhh.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5bf5bf005e4d84ebd162cfcb458f39aee
SHA14ffa8a9877fca3fd4383ec7de01a951e0a5d8bcf
SHA256fc27bc1f8edea0cd07acd20c6740805d89ed21c49b31c8a90b75e3ea9fe29217
SHA5124a63e4fb5fc1ff2adf17aa4d6ec565b29979e0d955064952dc2f88551ff5037e504aed639ae4e99ba902beef2c569310489a7972bf5947c37c77356fc332dc0f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gaix9yhh.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD58125f7374d074c12af2c33ca8eeafb37
SHA1bac24ea4f7847c84723d46f8296b5944a8fcb4e0
SHA256e298e878c7b314a11de84b4f81e1c683428a64739620c3a88647a177021afa93
SHA51232859bff09139d6a7e3fae57c8872d1890e6907288140fa48f617af3bd262a49641f9814e8cbcbadb98a6693c2b3115786c3b1c0b434ddf5b627ef32f5790a2d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gaix9yhh.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5ebad4e6f49897b832c76903a3be78bad
SHA1a38d68ac42f1cbf9dc0d7fc473bd9c8466fa0107
SHA256c29802d22b75f259f3f7eaceb1e890b4d3a77ac3a8eff18250aa7e5f14593b22
SHA512e1ed05afe4429159a78edc05eff6eaa94d368bab4703a1b78582f235ae0304f933b1ee0f32e182ed5cbb456f785f089681b66b626c1b09308ae82a9d9096fc29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gaix9yhh.default-release\sessionstore.jsonlz4
Filesize3KB
MD5c9fa3c29bd86ac1e390324b852d07b75
SHA17141bb4c69a02568b00b040e477447b343169f1c
SHA256d5a9ed0e3f6532cf7d2ad7f2d8fdb11a7773cf6bab57b3a546e66340560fc1c0
SHA51220fef73dbe273d4476c1205e15c687e529252b3d7dc63a69c554e34d78c17673de629a9f048108f1c311e7e1cb2e08038cc565dfd800427520c0a358820c2aa9
-
Filesize
5KB
MD5c29f4ea77f0b455f7afaa7de575129f5
SHA1e949f448bdc5a54574bb995d62e25fb7985f496e
SHA256d011cf04a465856bfb56285e520a5f2cf70ccd7edb5623db168b432913dbe92f
SHA512990260640c0695ca515111c851522a80674835d568f516262a8c4e385cbe0d32bfc1f81512581e6e483e55b8bc6754395a0d1fe0acd1859b7156733605e4e554
-
Filesize
14KB
MD5474a3ce61836306e165346b553e3e2df
SHA139e955e7f9a0f42cb82d3519ac6e2aab8a10fca9
SHA2568f860e0898f8be71c432112029ee6b3a9c6311bcff11ddbf6e215a1a33a0d1e4
SHA512ca30037d11fea9b825a0ca73269f2bd593d48a46d1df7ae9ee840254d7f9e659b572038aa572fe53fdf5cb185a83e44fbb010131bdfe620044b32ab13b89f9e5