Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
598s -
max time network
590s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/06/2024, 08:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://puregarry.weebly.com/windows-serial-terminal-arduino.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
http://puregarry.weebly.com/windows-serial-terminal-arduino.html
Resource
win11-20240508-en
General
-
Target
http://puregarry.weebly.com/windows-serial-terminal-arduino.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133624809456232796" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 408 1856 chrome.exe 77 PID 1856 wrote to memory of 408 1856 chrome.exe 77 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 2656 1856 chrome.exe 78 PID 1856 wrote to memory of 108 1856 chrome.exe 79 PID 1856 wrote to memory of 108 1856 chrome.exe 79 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80 PID 1856 wrote to memory of 2944 1856 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://puregarry.weebly.com/windows-serial-terminal-arduino.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbae5eab58,0x7ffbae5eab68,0x7ffbae5eab782⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1800,i,16006536174069831252,4790846934454791858,131072 /prefetch:22⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1800,i,16006536174069831252,4790846934454791858,131072 /prefetch:82⤵PID:108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2120 --field-trial-handle=1800,i,16006536174069831252,4790846934454791858,131072 /prefetch:82⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1800,i,16006536174069831252,4790846934454791858,131072 /prefetch:12⤵PID:564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1800,i,16006536174069831252,4790846934454791858,131072 /prefetch:12⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3760 --field-trial-handle=1800,i,16006536174069831252,4790846934454791858,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3936 --field-trial-handle=1800,i,16006536174069831252,4790846934454791858,131072 /prefetch:82⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1800,i,16006536174069831252,4790846934454791858,131072 /prefetch:82⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2504 --field-trial-handle=1800,i,16006536174069831252,4790846934454791858,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5bdc5eaaf6388242668c6b46db2cd6ce2
SHA18a0075c1c79e64a542ec100796eb961fd9be7a5a
SHA256772fbe251c364315211d0a301d2c8c40fe09d8d03227137f084b5743e85fa5e3
SHA5125ac1cc6f01ccb0aa6ad6b213d87eb1fe5c005a0ffa0378c61950926e30b72aa8442444c2f568236261a59019a3b731f481a70ccdffd5cd844b0df43b35199edc
-
Filesize
2KB
MD5555422c21f708bf5689d8d31cc108bf9
SHA1cac48120fb031038a832d3c9b362a44381217be1
SHA256efeeb3e16d3847a4945c03851a8bc22d404f96230d450e17b389b9b78fa65567
SHA512b07b99e6f68e1859fdae6031d8c48669de20f9f2a521585fced64a773983a3394b9bf7f301d6766ad32889be1c313f21c31e1d01dc578a496565a9f63a2fc646
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD59d654ed78de2578b9c6043beca89f8a6
SHA1103b0c509f714a8085519d07056d3e8e3dc28910
SHA2566550fa6192e175411221a1c9c19fc20e4e3926e57ffe3b7add43b8aa7bcbcb5b
SHA512f1162051dea419ae074946a74063190dde66fdeb94eed73c7fd5a4da11e603af1d4e2d6eb9d2b570e597b1d11188589c53debeecbd9e2241cad7a4d790cc2440
-
Filesize
7KB
MD557847d759dba183f2cf5d12840eb11cd
SHA141aa41774c53357d050fa6621327f14c2c2eb544
SHA2562560e73d7bc68dee6be2319cf9a6eebaef46882d54dd5384ab1247670895eb35
SHA5125d6d5b574eb64fb1cfc88ef6a4bc248a9cccf8e6255255398bbda6f0984e9500bc6385a6fc040324d723c745929d266ea10e08c392587a3f43f3dea83a1891eb
-
Filesize
129KB
MD5983332f4d730bd6324915bae09bf5be1
SHA123b5f36eca38c2dc1e6c6ba9d980da367078c092
SHA2561da9ff6b06b298d75ab2895da86d3af94093567708fea59e3ad5022354911ece
SHA5125eba70c507d1adc68057998077751a5a6f15f88c9c0dd3125725828d6eaa6064799c29b261fbd347e07d0b62fd677abce4fe43ff15b4d5e8a507de8a62521f8f