Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
341s -
max time network
343s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/05/2024, 04:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://kmspico.io/
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
https://kmspico.io/
Resource
win11-20240426-en
General
-
Target
https://kmspico.io/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133591855529591283" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3772 5072 chrome.exe 79 PID 5072 wrote to memory of 3772 5072 chrome.exe 79 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 1520 5072 chrome.exe 81 PID 5072 wrote to memory of 4244 5072 chrome.exe 82 PID 5072 wrote to memory of 4244 5072 chrome.exe 82 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83 PID 5072 wrote to memory of 1744 5072 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://kmspico.io/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa976bab58,0x7ffa976bab68,0x7ffa976bab782⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1744,i,12344090852507167602,11061623278509585560,131072 /prefetch:22⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1744,i,12344090852507167602,11061623278509585560,131072 /prefetch:82⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1744,i,12344090852507167602,11061623278509585560,131072 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1744,i,12344090852507167602,11061623278509585560,131072 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1744,i,12344090852507167602,11061623278509585560,131072 /prefetch:12⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4332 --field-trial-handle=1744,i,12344090852507167602,11061623278509585560,131072 /prefetch:82⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4468 --field-trial-handle=1744,i,12344090852507167602,11061623278509585560,131072 /prefetch:82⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1744,i,12344090852507167602,11061623278509585560,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5d465ba640eb75fc394a43d2085fde527
SHA1a3385f42b1971b4ab116074f65077e9eefd69f9d
SHA256c1475712cc5e047badb6707c7a792664376cb30622cc41000d2d96d3d5fb9c4b
SHA5122a608f9d2c00150b7085b330f1d3ac73aa2aea20dfad29a29d81405de52e9c3b109be0cf41601e664db5d6948bd7f0f437f8e7798423ff65d4ffc10add83b6a3
-
Filesize
264KB
MD509f58bbb7baa23506be6a5b5556587d6
SHA1e8213259f835d99e3e9a0a617f2b2a55c3a25b01
SHA2564b6128848f54325056c90cd61094e01f459e394fab1fb2b0198b3bc7b17e3455
SHA5120f732c7c68a1fc08770557047b3c9f09764a444e8eb1afccaf397d52279aaa19121d0c924e4ed9f4c619b9dfea3e921b2f22d5141f46510a97c76a4e3ee1ec37
-
Filesize
2KB
MD55473069d3937a9e640ddfc1902197437
SHA15e29f7ec8a3eac5afbdadb1a8c6781086f52db28
SHA256ed3b6b65041e9df8c35fe4d492d27f945c611028c9b789414b60265829583fbd
SHA512ceffc7b14c6b7330b88d6a86b7ce5619af4db9927915facb032545f97598a3f42bca0947f9492811a6cb493987f115fc1d54df900d267d4e2874f834abb39f47
-
Filesize
2KB
MD57ba4d425db837523ccaceb9845271cf2
SHA1f41d1985f378515bb9d0b58b4e9812b5da1d13ac
SHA2569b57cff30fb84d3b4f4ac600dc7321135cd110d86a8d812221dca2163f512090
SHA5129dcd47d6886f3d666c61b3363f1cb879b80b7030d09dcacff6c8bbd6765a97352e2b171b8fd351540b4c0da5bbc4c0697c74d4942a48506216b96e82a0ab1612
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5c9acab8c1c498cc60ca80bfe7d99e9fd
SHA19de9cb9d138158e9022454f268a27552b782423d
SHA25692f4cb723426a71beb0426a043a124233c9fca2a294a848fcfe794441a6ed229
SHA51292a50e2659ccfab0e23ffca009e2a4c1f502f9c213f76484106e2b98b0a87825ac0c6cf68c7f0ece1d9c76e23450cbf59a1f2f7ca456c1937a55f5f1d4d8987c
-
Filesize
7KB
MD5014ec995ec3d2905eeaaf89ce3bd63d2
SHA187b1961585b82374ca51df3c9048e4c5f39ffc07
SHA25638a11c4645ff7567b9e28c68bcbe52316e697d6f416b2afcbefb9e068bd19499
SHA512d75f49cf6318240ee1adfe07c9a118463be4a08fb950ecaf086ea958765af8442fc1c193f4021e26436e0239d7c45387ca5c0d4a9f085d78d24fdf393125cbff
-
Filesize
7KB
MD543f3864b7aba25b7b576928fbb863c79
SHA1c4cc4bdf0d83b74359436b768d0da221a5a1f5f1
SHA2560fe7a9068458bf0d472586cc147547fdf23478780e280c27fe7ce459c08d1250
SHA512821169c51625c72eb85f19f9836a80a72b8f0e05c0ecad54c15830d73407d6c2c9c760bca7759f611087605abb22a36620597bb0d600d653b40f9bc5e310a003
-
Filesize
130KB
MD5f102242ca5acc6e0fd92582d88d79502
SHA13b6bfbe45eb58c8979f8f7dce722fd2a7aae6e4c
SHA25670fb9582c6a223816060dab53005430ce271706ac5d3b425ccd8304760e92358
SHA512385a82e2578b98b838efba04731a0770e834137c1e444f9e4bcc25e50c11c127a00f0ad4ae0492ab9ff839e2d080962f8474a17282f75df20458ecb664e5f670
-
Filesize
130KB
MD5ccc1b9d7ac825301220891c747e3b53f
SHA1b72e4e148b82e6af5e30d60bf5d92b20bf290f6e
SHA256f14ce63bc254d40d9353e55c6a4d61ae26407cde870d5a8cc6b53c8d749076b1
SHA5120076670f6776eda8f4b4bbd8d94740ee9f791b3ea7ea6275df78e0baa26b316312595d4145b01b77dd71afd6d95c88ad601757da9c00b00724ce83b2bb701ece