Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
20/06/2024, 06:14
240620-gzk7eaxfmr 120/06/2024, 06:13
240620-gy2g1ataqb 120/06/2024, 05:59
240620-gp2fmsxcjl 8Analysis
-
max time kernel
45s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 06:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://animeslayerbeta.github.io/
Resource
win10v2004-20240508-en
General
-
Target
https://animeslayerbeta.github.io/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133633376929144342" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1132 chrome.exe 1132 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 672 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeManageVolumePrivilege 4164 svchost.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe Token: SeCreatePagefilePrivilege 1132 chrome.exe Token: SeShutdownPrivilege 1132 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe 1132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1132 wrote to memory of 3608 1132 chrome.exe 81 PID 1132 wrote to memory of 3608 1132 chrome.exe 81 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 4824 1132 chrome.exe 82 PID 1132 wrote to memory of 1472 1132 chrome.exe 83 PID 1132 wrote to memory of 1472 1132 chrome.exe 83 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84 PID 1132 wrote to memory of 4344 1132 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://animeslayerbeta.github.io/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6324ab58,0x7ffa6324ab68,0x7ffa6324ab782⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:22⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:82⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2252 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:12⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4392 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4332 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4972 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:12⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3344 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5104 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:12⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3332 --field-trial-handle=1932,i,1374493186755941102,15064213816388421037,131072 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4520
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4304
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5f8d939e52e10ec3d31eef8c1e6f613bc
SHA171bbc96013e7e887f7de9964b5f5f0ff64505de3
SHA256fb6f7830c75379cd50a11fe41343f7adafa77b9fe206b2930b002c06b591032b
SHA51239db30b1f8d0008ceb20f2fcca3006e44e34aa4dd6d9d4410ab99c5d05cab36875a3e8fc8e417392cfd63020ad0aed9289dd4fb0aac6f3264c8fcdf54df50f6f
-
Filesize
7KB
MD57688cf1615563c9dc1dc5591128614d6
SHA11d46f884ed12ee8c1ed059417c7a9b474b8d5e04
SHA256973880f839a4f02f0e7935e1971a5a6427443804063b9b38684b98dc279c01a2
SHA5124990306729a68f12d1838e076c041be6d9eb8c6c2b6d506f3649a2ade77587b67c7f9926632815e14390fd81ec3034ba6f3bab50a1cc494e8e81c6e0de12872a
-
Filesize
7KB
MD5afcb88e6a4754c2836991d26546301cc
SHA154d7fa652c9e6c1701024094d2f38291cc784c5a
SHA256c1f5ba2e33323cad213fb7f64fa841564ec001680ec86c04273d99e3ee8cc1f7
SHA5123635baa931f6cff309a5a06bc3328acd54ece006a4b1b4c105250253356338f897d03dd1fc7823911faf234625629f5497dd83ebdd9d6b87bb9349d6cf70f1c4
-
Filesize
257KB
MD5700a6176c06632c46a4bacc5a0e2b8b3
SHA1286eb9d2f048c7bf24fa4a9009a3b10732bac9f3
SHA2560e6499f3787f5654b4612ee8f6eafaafd2452b8ccf0c25d2575cfa11e3e8be98
SHA512cc05e3f694a4429787bb395e22b42bb314ab99a623ba50ec0f065e31541a2effaf9fefc2c5e8582cfed70fdad17af2143b5e4a86018411304f7adb838e081c21
-
Filesize
257KB
MD5e9568bb155c460ee12c81c697f0bf597
SHA144eafacca68bca71d0d8d4fae81f80b16009b728
SHA2568fc28956269d9cc7fac03ff77c23d52e6e089233bd74a6742d8ac77b9b2140ed
SHA5125ac8e9cb328d7a01c8feb5b9edabdb89ca3c7556c88b899020b4fad91cd2b752ed4660cb085ec78b5768ffb379b04d812d0509f1c5a0d2df22d1fc657fbbb716
-
Filesize
91KB
MD5d32bceaacba5ff766a65b60814186f22
SHA18638c5c7f33039fd597929bc9638e2f2d227e1a4
SHA2565e77eed1754804e48be2bf7d86d9738e79e09eef654904e54f8f847eda160d02
SHA512bd719f1dbc53a5f9b5cb0462c13dc3e255cf258fe02623557856c3662a31d3c7f9fa978788f16f767319baa4cd515db69707b80cbe3a5ca2586c88e20319b5f8
-
Filesize
88KB
MD544d26f19de4f669ce70f5761803cdab3
SHA11f78a7af1e6d15d7645f14547f0a20f376984a5e
SHA256121360e46e4d384ac3289b025e64c1ae5a8ab30dac96f5e3a90700efa589fcd0
SHA512ab6724052533d6712e82ca941f906cac87f8ac7c510b293a29dfd5c1f1c63a3ed69c550daa9f69f85e5adf4c366b1dd07072accf4aeb6854b61841986bc57b29