Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 12:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://nulls.solutions/shopify/gift-wrap/app/js/nulls-gift-wrap.js
Resource
win10v2004-20240226-en
General
-
Target
http://nulls.solutions/shopify/gift-wrap/app/js/nulls-gift-wrap.js
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133558431943978719" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3728 chrome.exe 3728 chrome.exe 4376 chrome.exe 4376 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeCreatePagefilePrivilege 3728 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3728 wrote to memory of 4892 3728 chrome.exe 88 PID 3728 wrote to memory of 4892 3728 chrome.exe 88 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 1756 3728 chrome.exe 90 PID 3728 wrote to memory of 4496 3728 chrome.exe 91 PID 3728 wrote to memory of 4496 3728 chrome.exe 91 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92 PID 3728 wrote to memory of 3828 3728 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://nulls.solutions/shopify/gift-wrap/app/js/nulls-gift-wrap.js1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bd149758,0x7ff8bd149768,0x7ff8bd1497782⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:22⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:82⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:12⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3896 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4044 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:82⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4992 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3760 --field-trial-handle=1856,i,5532989479383194931,12347982895615545924,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ca78a42e64d73ece15cd14b5be9cf697
SHA16a97d0c0dcbd35e18166ddf166e19dd5cecc8cbb
SHA2568ecb0c05be79cefa6a37bdbdb1cb48b19c91901ca9026dce946e9b2d8e08fcaf
SHA512c8ddbbe95d1c4aed7ccae339584016e93116cf24723f7758b62275e754e89339d7467989d597a71e9a476491db6bfb7fd28c4fea49418758d2777e11f9a8fe92
-
Filesize
6KB
MD554bcb32f938d60a673ac306e7d93706c
SHA1eeb9d9d03af1b8cf6ebc22a0417b4f6bbaf91cd9
SHA2567ca63abf94164bb9e8629240e49a46d3683c4ca9fa933bdd0dfec6310c41a165
SHA51263399499a052611cde45df695f1e5a5d47b9b2e12a54e89ab7134311c0f48b3945dc530012fca6f1a70103cd99f58bbebf9e24749e935a9d64b2bb349b26c601
-
Filesize
6KB
MD5e3b945708d3ac646b2a359bcc73d334a
SHA13804ca55667bedcc29a10983647ba12eeed83bab
SHA256867dc0cbe2b282795107c98f345034f6373248912b3a8037500b837ff8ce83dc
SHA512aa2d9337ccbbc623772c3227e4f425856106c9de8be5192be189546743bf2eaa250249866e17da582e0812bbbf33d1ae2e71853543f53b5007c71428295ac8d3
-
Filesize
128KB
MD53ed1eb6f770942b6d163e4f4f60354da
SHA124f0261c3e72a90aec622aa06f5405e1a0137001
SHA25668ca086d5cf57b61a62bc2edc97b43eed96c178c2c6427ef9726e1adaace0bd4
SHA512f467e319aa20e790a73e3efb0637a96a85be316b84d849f6b584502ee1b354c4e3bafa6d01798d9ef10a413a9d7cbefa1e1f8905f5e6d1b9431611621a7b3194
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd