Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 13:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ch3ckster.wuaze.com/
Resource
win10v2004-20240226-en
General
-
Target
http://ch3ckster.wuaze.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133572296028963824" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2272 chrome.exe 2272 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1556 2840 chrome.exe 85 PID 2840 wrote to memory of 1556 2840 chrome.exe 85 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 2024 2840 chrome.exe 89 PID 2840 wrote to memory of 3544 2840 chrome.exe 90 PID 2840 wrote to memory of 3544 2840 chrome.exe 90 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91 PID 2840 wrote to memory of 1480 2840 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ch3ckster.wuaze.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3bce9758,0x7ffa3bce9768,0x7ffa3bce97782⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1856,i,1284072409296646828,16803796727450148685,131072 /prefetch:22⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1856,i,1284072409296646828,16803796727450148685,131072 /prefetch:82⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1856,i,1284072409296646828,16803796727450148685,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1856,i,1284072409296646828,16803796727450148685,131072 /prefetch:12⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1856,i,1284072409296646828,16803796727450148685,131072 /prefetch:12⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1856,i,1284072409296646828,16803796727450148685,131072 /prefetch:82⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1856,i,1284072409296646828,16803796727450148685,131072 /prefetch:82⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5048 --field-trial-handle=1856,i,1284072409296646828,16803796727450148685,131072 /prefetch:12⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4128 --field-trial-handle=1856,i,1284072409296646828,16803796727450148685,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2444 --field-trial-handle=1856,i,1284072409296646828,16803796727450148685,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5e5019e520d6c7943c478cd9912cdb227
SHA1eafe57772acf2b8e21ea0c8731a0250c277a6a72
SHA2562347e70255fbd537bc91d39ff5c7184ba504c02c9d96dc0c66a0fa7b7a3dbbab
SHA5125b23ef40862b6b38eb5bdb4f3a38b364f8fdbf3dd8c5f64cdac134bd9b2fc0a59e665887882ec7495e612062b38b1f490c883a9f85b2afe2df01e690227c556e
-
Filesize
885B
MD52282821df9df3bd8de481c54c6c2ca9c
SHA1173a756379a26abb605d67633f1dc832907b27b2
SHA256e85576a33edd839d5df162892d21ab916da45330509b2f2bbd89b5d4c1bb9a6e
SHA51288a950301ffbcae0e65953fb8035ea5cfced363e339e3dba00ce5f51276f268b3670aabd586e0608883bd4f2d2b82248c4abb435022fa00b5f39dc81e4dea8c1
-
Filesize
6KB
MD5cbe062c51e1c302719eb7e1f280b4fd5
SHA1ad7b89a64de29246677480d6d76e75ae8a8f1cb3
SHA25609f1738c1fb21d8222e58f970d0e946cc73274dc6c20b1b94e89198810bed60a
SHA5126f6c45561a7617457d3408f56288514079648b3c2f0ced45eaa5b48efb07f4162236dbd4fd8291f6856d6fbdaea7fc7418a4bbc9dbe4597f3bc234760e96c352
-
Filesize
6KB
MD5ed8fbaf03a0a82b16d6263ca78cb8582
SHA110ad85d52e3c8aad54a905c5db5ca7958b3f3ff4
SHA25641149cbd274bb31f28e0cfad78c6e9077928cf15d29e537d96c254ba903ac6da
SHA51240648c448291a2b9b86b4bced03585ee3b2fdbcfa520ad3081154b695637f4f3745376fc2b45755365d87345011dba1d6033afadfe5a640ce05a82029a0d5a24
-
Filesize
128KB
MD5ebaa5f7870506b76d8185e3e540fe6a5
SHA1a4963f55535efa425821fe7b49b2068a77574d0d
SHA25652b9928afdfbf32fa75cead71206cf4f5058dd3c29fff4e7367720a115af4517
SHA512995bdb6b3ba27bfdf3389f8b75aea054a9fb9ccac5e7d8f281e6fdb68be9ed9af1c37931c26a4ced7108c1e540eb579c40bcf10676f02a2c1e2d8b54d10b87c3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd