Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/05/2024, 02:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://curlbash.000webhostapp.com/08804new.bs64
Resource
win11-20240419-en
General
-
Target
https://curlbash.000webhostapp.com/08804new.bs64
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609038000689199" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 832 3948 chrome.exe 78 PID 3948 wrote to memory of 832 3948 chrome.exe 78 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 4720 3948 chrome.exe 79 PID 3948 wrote to memory of 3984 3948 chrome.exe 80 PID 3948 wrote to memory of 3984 3948 chrome.exe 80 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81 PID 3948 wrote to memory of 3364 3948 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://curlbash.000webhostapp.com/08804new.bs641⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff250fcc40,0x7fff250fcc4c,0x7fff250fcc582⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,2300478495667429446,10662111355978608291,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1812 /prefetch:22⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2016,i,2300478495667429446,10662111355978608291,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2140 /prefetch:32⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,2300478495667429446,10662111355978608291,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2352 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,2300478495667429446,10662111355978608291,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,2300478495667429446,10662111355978608291,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4552,i,2300478495667429446,10662111355978608291,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3736 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:5020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5a97f03fcafa255c6026c9fad815c5983
SHA131f6cf91e49c25decca537656a6f2d51cc74c715
SHA2564d1ec71bab9463850e6d8c5ff7d80d6635869be69e01f3e45397ef6b03e4d972
SHA512c92356b432eb9cc3cfe804ac9ed200dfb32670d99b5bf85ec793ea5e0afbe7a3e5eb1cd7108b91699f521131e526dac56efb1316f450214cec1c6b867da0002b
-
Filesize
168B
MD57e3c7cdf8284a105ca6f301a9d2c1ad3
SHA10ca4806736c91b40fd1bf2c23c9f70209cd0b49b
SHA256ff1678d7837f244559183c2ce8a44f4cc21065d14bc043037e5eb286384aa8e1
SHA5125caa7cedd3b7dffc20f7b591f8b3e01e191a14d69d50d695b0f0f4f0b7589ca11a2d08c28778d1e093a612a2327d8578a49a8eb5733584dbe3593e9094b0cd97
-
Filesize
4KB
MD5774a18c62ab7913048cfccd6a51814f3
SHA135bb81aa27796945e706503a4ca04215a96a9531
SHA256ae23ce722e3675aae749a370dea431419a59b571415fb61e3b4d94bd50e495e4
SHA512e078c3a9042346a6882a8d9eaccac22b8842993ef2ad90dbbd03d51cad2899ff7ca14659facbb7c7f9d4f2b650aa4818938ec86c5cfae2e03d2b9a1d265ec351
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5c3bcb93c63e71709e0bbb9fcf6e67cb9
SHA1fa7927d478f1f88eaa3c03cfb07ca66dd0610ac9
SHA2569a4b27412862eb8d10a85389939c452f09f4059b88de6cc0d89ea0455a0a2edd
SHA51208c826628378fb186e28693b4fa925e9edda17c31afe68675bed6563066cd766f2a2b13c03e87b41c999b5681ce32946ec47c6582e026927d844577aa5d205e7
-
Filesize
9KB
MD51b108b763f35c303d10e074113ae7f23
SHA18e7e05dcfb1a2df1fb04fa15c674eb88f9a8bd5e
SHA256c068eda0a0719de165dbf9454e08d264a74356297f133f545ee22de8fe281312
SHA512970d12eb1bc1e6dd460f0900e9d8f64f3fec875fd0615433220a4be35140a32bdb96902bb5c5332139b67d84fd1406301aeda3f913894a78589136bb8535fadf
-
Filesize
77KB
MD5532f2ae48a0d3c1ccd3508e48f2d17d9
SHA130b825b6ccf6187d061d891a98359f7b751145f9
SHA2567e9a4e316bce01681e7c2fa88845362fa37856010ff2abb4b6c8de866d99c2ac
SHA512fc01ae6924779ae431f4c8476160c42da2775e7dcb7f352c47d2c2a3083ef2cdfebb64547e398f508f7f407d12545b090218c2901cfcae7dd3b3a755185b5908
-
Filesize
77KB
MD5a7de0f476740db1455db7ac4d80ad67e
SHA100a9adf3f0c8f4b9b1ed79267c1f4449d6e56d62
SHA256bbb0406e8d35dbd236062e8e0e7d1ac43dff26ab6361783081818197efa2ddaa
SHA51298b19bb7af5cd18ce9d917c18427c707370805e2429a14be1038394afc8568476d305c676a9693526af24b5419db8698ac10fae8cf87b99fdb4bd194878d2d72
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58