Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 09:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://terapishafa.com/play.php
Resource
win10v2004-20240508-en
General
-
Target
https://terapishafa.com/play.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133628294117992830" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 2304 chrome.exe 2304 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1816 wrote to memory of 3640 1816 chrome.exe 82 PID 1816 wrote to memory of 3640 1816 chrome.exe 82 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 3792 1816 chrome.exe 86 PID 1816 wrote to memory of 1132 1816 chrome.exe 87 PID 1816 wrote to memory of 1132 1816 chrome.exe 87 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88 PID 1816 wrote to memory of 3372 1816 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://terapishafa.com/play.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef951ab58,0x7ffef951ab68,0x7ffef951ab782⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:22⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:82⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1900 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4568 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4764 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:82⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4368 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:12⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1548 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4544 --field-trial-handle=1936,i,13053599146629774536,12501981514695785864,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5a2fd44a484689b30e6129fbd63fb4039
SHA12ab5e7af83461d2f553a83075a19d2b072efad4e
SHA2568ff48f5eb6d4b5b01bb08971e034f5487fd77c7a2a8c01ecb20a35546365977d
SHA5121752c374037d9433c4c5263029bb201675ac0c2eaa5dda3faebc58bbdeaa701e852ab0b50afea8510eba607c878b71ca8af8d2b582ce557d313a2bed0de1331c
-
Filesize
257KB
MD5b097229877251952ac4f6ed519afca5b
SHA1a25e75d45484705c280a8c4dbb5daa155b93730d
SHA256f46de35ae3f248ff11be95aa0b9d74eb6278eb7bb9528eb208197157a24af4f3
SHA5125b6d7e0918ebc92499ba51ebfc880dc4ff75115b6c28e0e4b3baf226fb5b4f96f798085099b12b22ea94d3948058cd2d24eba5f85ca284911057c565bee55b16
-
Filesize
257KB
MD512a6d4f2f9a12837206e90e98e9ce084
SHA1c5aa8e83d9d03328d1ec1730fbf4d88cf4c80ee2
SHA25615e78f2fa806a0d9f5c3ea13296ce60c152288c3563f61993fe6536272c84458
SHA512cb2fcc7b328f1dd9471ee7a5305cec550bbff110e1ad7bb42da0321882c6943f0dc7de0727c677b46f8d1fdf2d606a79b1ae2a65805f94168dc09d9f91e0204c
-
Filesize
91KB
MD56b43d43573d0a914aad87221d0ce6ef1
SHA1b0b6aa81c7d3f8cbce04a727f5083e088a5fe78b
SHA256366cf3508c39d358c2ae1079bffcf1ec694f1e80f8c29dbbc193cdd8f72d88a7
SHA51291ab454f41441d5e8be8018ddebf312383519974e0fc0af5a4b3151ace7518b93e8678c9e1e8dde1320bdf531551cbb071c59c553e9d4c1289752e71f6b5e38d
-
Filesize
88KB
MD571a9d9aacd134ff292409059f7f37be9
SHA19e7df0c113ec45f224c8b2c8e971feccc4738ca0
SHA256e755832950e75e20b6b016c5fe248f10cc7873a59338d312d7ab0205ce9293d3
SHA5122d17da74f391290949161cef18440f12600f4da8312ef539015366bccd4dbeb6708c3f8f968c81d086432cfcdbe1841c06371d9a25e35f40d67a9dfed09d2412