Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
12/06/2024, 15:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s2.dosya.tc/server30/9vjmo1/Craftrise_Rayzen.rar.html
Resource
win10-20240404-en
General
-
Target
https://s2.dosya.tc/server30/9vjmo1/Craftrise_Rayzen.rar.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133626808885692305" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1448 chrome.exe 1448 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe Token: SeShutdownPrivilege 1448 chrome.exe Token: SeCreatePagefilePrivilege 1448 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe 1448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2304 1448 chrome.exe 73 PID 1448 wrote to memory of 2304 1448 chrome.exe 73 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 4668 1448 chrome.exe 75 PID 1448 wrote to memory of 2904 1448 chrome.exe 76 PID 1448 wrote to memory of 2904 1448 chrome.exe 76 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77 PID 1448 wrote to memory of 3900 1448 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://s2.dosya.tc/server30/9vjmo1/Craftrise_Rayzen.rar.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffeab689758,0x7ffeab689768,0x7ffeab6897782⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1812,i,15239002380782050356,17207932468687979750,131072 /prefetch:22⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1752 --field-trial-handle=1812,i,15239002380782050356,17207932468687979750,131072 /prefetch:82⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1924 --field-trial-handle=1812,i,15239002380782050356,17207932468687979750,131072 /prefetch:82⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1812,i,15239002380782050356,17207932468687979750,131072 /prefetch:12⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1812,i,15239002380782050356,17207932468687979750,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4748 --field-trial-handle=1812,i,15239002380782050356,17207932468687979750,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1812,i,15239002380782050356,17207932468687979750,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 --field-trial-handle=1812,i,15239002380782050356,17207932468687979750,131072 /prefetch:82⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5016 --field-trial-handle=1812,i,15239002380782050356,17207932468687979750,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD544b680f02b22c31be0fd43268913b6a5
SHA136c6106bc089797e6678640fc760faa7c12d784f
SHA256a0d0bc44fd312f9757faaec106aa6dd4a460f19e3566630d5e693e12780bf9f6
SHA51281e6ea1b72e04b91a93817fb6aa9a52f5c26402fc9e5231eccf7d7082306b25aef3840b47c0fc8a47635fef5ab275dccf9b7fdfff8eb0bf7cdbbbe10c305f022
-
Filesize
2KB
MD5897390cc4421e12a9c9cb16cbb2b8a5e
SHA133a1084e5e4a5bae90a83b27170a4d5c9738360c
SHA256baa412ee516cf458c4dbb3c66d906b052148785bd004ab1a6bd60d7f06f1d13e
SHA5120748718ceee5bc0568e45fb335467b3fdbea0935d68f334cb843cc47295521b28ab4033ee6a3c35d9ba42022a21fcc120c8e6552b2d49b1957001e2ca8459352
-
Filesize
2KB
MD5dda77726faf1ef851fafe5f6120d4b6e
SHA1a52efd8bd404b634c7ed47517d39b7af852cb18d
SHA256be82e1b36e9fbb77ac58163af97d105e6fee0ccb0c3589085c8585552f815b83
SHA512fc44006911bd618eff911ba032f41c44e7e29ca7911c9eaf44cab70d695cbb97ef9573717895da969d1e8285e5d85062f111b54899512b746c8124e377cd2701
-
Filesize
2KB
MD5529e38bc4785439c09f14d9e08241399
SHA19ac4bf6474513e999813318595e2f704079066c2
SHA256dd03473d5cdb6fc4117f96f412d73170aac3d2202f9f3b4c3e413faa6cd6cc09
SHA5123e934da5728448bca47fef62af882dea54974354ea96f25681ba283ffa4c227ee6116e4c0e1ecbb94482f5719c0492a4aba0e7b4f55e88a57e49f52e46da6d1c
-
Filesize
871B
MD5192f382c7fbe59fb62ead98c16d08df4
SHA1ffa0efe3647ac11bb73913f7397b57b175773d68
SHA2566164bce66e62c75000e852cf4683863a48d1532d1bc037196d3f77df6d0e12b1
SHA512fb5350fc258defd80748c9edabdee9915aebc60366d97e7669546a980c91d16d1c52a6980c432169a75d9709e0e975f50f63564226ef5befc761ffaadd2bc714
-
Filesize
6KB
MD57cedac372b4cd49e685b791e52ef063f
SHA1eacfb53208d4e7fc0ae69a26425985067de64e89
SHA25610b5d7fdb7c8896f0c53640d119e59a9f898c5a5bce1b9478865ecff1c0e0670
SHA5124a5be11ea4cb83ecf47d52cad11934e2e363b15a74776483691ef3ba1267efaca5b3a7e354bff094f17d5bb83f1df383c591943a8e2a783ca09aba56e0c4d378
-
Filesize
6KB
MD505d463828a905df1f06da49c6e2a7c0f
SHA1ae9411cd794cfc45bbeaa3d3c244f56040ddeb29
SHA256fb01202155607b0fc932c7279dd9ded441bd06dc8c3029e1ed9c4cbc13c04536
SHA51200f7e329bf18fd3f51af9b7cd91834ae4624d0d36434a82f06fbb03acf75329ec8dee49af46e0f6da31474902c093dcc05acecef90fa6d7a7cf39b873c791d43
-
Filesize
6KB
MD5ce1210e7886c98f9eff536ee8b794956
SHA18187abe02f99a7594a3291bcefdb00628e7b9e4b
SHA256d3d5f3b397f0aa4ab4270d99e603a5f456c5d22696872c2cf671b4c3e617be21
SHA5122f85f3126c6fd5ec828d0d88354715c4e5aeef96d3e0cd06609b07e4d7fd64255d659f37f8844c91a436efd34f9c9fe89c053df7dd5a2d8402cd72f2925130ca
-
Filesize
136KB
MD5a96ff73c50ae9e40e5180ee7244b848a
SHA15dee611efffc90b945d0cbd1d1136be577be01f2
SHA2561a2e11309c3c2c4dc644b955ae7df86883c05c3fde0d35675dc71b1b1bb9cf18
SHA5121022c587821c0c6785ee8e8d07e7a2cd7d8e32f969dffd52b03e8c2f6b2e4440ca96c3cfb835e234938297b62d03a56bf6688c2484b6ac6a47be3849b461495f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd