Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 09:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://scriptium.nl
Resource
win10v2004-20240226-en
General
-
Target
http://scriptium.nl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133553140799590461" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 724 chrome.exe 724 chrome.exe 3372 chrome.exe 3372 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 724 wrote to memory of 3836 724 chrome.exe 88 PID 724 wrote to memory of 3836 724 chrome.exe 88 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3284 724 chrome.exe 90 PID 724 wrote to memory of 3028 724 chrome.exe 91 PID 724 wrote to memory of 3028 724 chrome.exe 91 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92 PID 724 wrote to memory of 1164 724 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://scriptium.nl1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe87b79758,0x7ffe87b79768,0x7ffe87b797782⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1052 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:22⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:12⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:82⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4792 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3460 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:12⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2916 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:12⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2236 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=748 --field-trial-handle=1788,i,7346791362027750945,10998106408078888245,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50a159f0c609723344b3f1e9aaf857985
SHA1a5b3fc444afd91c7e92319e49473dc4a11e5d2d7
SHA2567cb8b5877597ba35a84359e8f1c90dfb6cb7a81e4328263272f8852e83b73021
SHA5121bee8cf33753e7670d7f8e7a3b021da8d67c998925762b60011c50104d36dd06308747fe1c9bf357ce59f806bfba04a97f9af8bf738c13631b9f271244ef5729
-
Filesize
6KB
MD53bab21509fb2dab840d13108cdfd6d10
SHA1dfa613d6192c0e55e55c10aca5c3723cdbca0aa6
SHA25601951e4c1e0795dcda8b1360fdf6a488795bc81c4687cb851c332b5238da3ff0
SHA512ab4e550467b53d772bfe302c9b423ac2f354ab412c99b128a6b57195ecf53f6e1d8d13b70c4d0f46720ee78caebccae06b61cc8ac3fb542f9c2750f368389296
-
Filesize
6KB
MD56243a87b039c5675b1aee9155da9f7fb
SHA12cb55ae27a0970303cbe630dc0d08bea41c3a9a8
SHA256dda8ff8570b717ddb736908894ffa561d671e1ee2e9f96c9245cd5c4951bc12c
SHA5125e9ece6ae6f4a72b1f9e07d631f7312353b076a08f71447336c83be5016457cb2be47429f97bd0ee2fea9e0b172acf0ba41f704b2c0e875f5b8d80c7ca4b1a34
-
Filesize
128KB
MD528e225d747138de699a94d0b2eda08f8
SHA1835cf7be4a9c6bfc09758988f16f908be112325c
SHA2569e9a266e0cb557fe606ccb27cec5df876c8d29eb43d2b22b1b2f14b443876fce
SHA512087da46a5d9c94e6844ea43ce837b10a43c8998deaafa8dcbfef1749b25cf3277010edb2b0bad467c0522a4a4b142b800c8d28ea060c7db796dc720512b2332f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd