Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1URLScan
urlscan
1http://livex2.plstre...
windows10-2004-x64
1http://livex2.plstre...
android-9-x86
7http://livex2.plstre...
android-10-x64
7http://livex2.plstre...
android-11-x64
7http://livex2.plstre...
macos-10.15-amd64
4http://livex2.plstre...
ubuntu-18.04-amd64
7http://livex2.plstre...
debian-9-armhf
http://livex2.plstre...
debian-9-mips
http://livex2.plstre...
debian-9-mipsel
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 08:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://livex2.plstreams100.stream
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
http://livex2.plstreams100.stream
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral3
Sample
http://livex2.plstreams100.stream
Resource
android-x64-20240221-en
Behavioral task
behavioral4
Sample
http://livex2.plstreams100.stream
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral5
Sample
http://livex2.plstreams100.stream
Resource
macos-20240410-en
Behavioral task
behavioral6
Sample
http://livex2.plstreams100.stream
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral7
Sample
http://livex2.plstreams100.stream
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral8
Sample
http://livex2.plstreams100.stream
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral9
Sample
http://livex2.plstreams100.stream
Resource
debian9-mipsel-20240226-en
General
-
Target
http://livex2.plstreams100.stream
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133572962971476811" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2380 chrome.exe 2380 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2088 2380 chrome.exe 87 PID 2380 wrote to memory of 2088 2380 chrome.exe 87 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 2392 2380 chrome.exe 89 PID 2380 wrote to memory of 4444 2380 chrome.exe 90 PID 2380 wrote to memory of 4444 2380 chrome.exe 90 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91 PID 2380 wrote to memory of 5024 2380 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://livex2.plstreams100.stream1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc5569758,0x7ffdc5569768,0x7ffdc55697782⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:22⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:82⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2860 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:12⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4160 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:12⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3328 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4004 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:82⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3960 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:12⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2336 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:12⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3324 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1856,i,14340464497259871994,1317565302371778612,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
677B
MD5733bf6f5befc4a727b952be604edf441
SHA14c2cccc3be4ebd043a74eb7968d975c115a07d94
SHA256e27a5e488b51305bf41d4e82882269f3279976756a75dd67b975acb4ec4c8f7d
SHA5121642c8e7db14d5df450034c52626e86a071ceac7c2ff1521fcca3ad67880d810b8d8f60da3bbfc163fea69c87150a69697149afc118eb942c9b64c8190e0a5b6
-
Filesize
6KB
MD5b85eccb04cb47138e6f38fbb9987f368
SHA1590e3f554d0e99a102404af94444a347b1ce6337
SHA256be68285b7b5381443d723db4bb83a29d3c6363e6da00006cc207d00cb8a1e5a9
SHA51241faf517e39f02154504d81828e8786009fd0fd9949515796c0b8d58bb42fa1738c834d5e67075e98ab2cf5579198ee44d9208f7a1721537acd56d8eae5ab8d8
-
Filesize
6KB
MD549f83b3b97d997e7a4b73362f2a9e919
SHA1310ad2309371c4749b236d1a6c4ac6603feca26b
SHA256d98c5c987896c181f22b554e8db2670852c3f92fa955009eca9af64c2302740a
SHA5125542ea36ea8ec7b195daa75580dc3d44b98a1ee70ced03e0a911f45d8176abb13e3e934e88b93a24258eb9255b622c1401ee342a7abb8acae3d35717b7624c0c
-
Filesize
128KB
MD5a172491ea6f4d52dba698f92559e6d3e
SHA1a56207fdc6bae9294d1b044de3a06decd8a62716
SHA2561ce7128e8d2ffb17f8bdba4fb1ee8a765f21d95585a3e4f498d4018575c3c031
SHA512b577fed2c5fde4dd54873a0f9e2047f60d5bb0db5707792fcf6b636c84588d6662e9a2b9a9986c3146e9cb1308e616973a660ab5f4ab0af710eb4c63edefc62d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd