Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/07/2024, 15:02

240701-sev2na1fnq 8

01/07/2024, 14:43

240701-r3zjbaxbld 1

01/07/2024, 07:26

240701-h91khsyhlc 1

Analysis

  • max time kernel
    599s
  • max time network
    490s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 14:43

General

  • Target

    http://playboxgamemix.netlify.app

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://playboxgamemix.netlify.app
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffca75ab58,0x7fffca75ab68,0x7fffca75ab78
      2⤵
        PID:372
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:2
        2⤵
          PID:4304
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:8
          2⤵
            PID:4560
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2252 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:8
            2⤵
              PID:2352
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:1
              2⤵
                PID:4656
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:1
                2⤵
                  PID:1292
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4252 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:1
                  2⤵
                    PID:4876
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:8
                    2⤵
                      PID:1352
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:8
                      2⤵
                        PID:648
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2948 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:8
                        2⤵
                          PID:1528
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=876 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:892
                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                        1⤵
                          PID:4512

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          523B

                          MD5

                          71892178f6b2576434a1cd02684d885b

                          SHA1

                          2cf214bd04d35feedece9fe159fc364795dbe018

                          SHA256

                          ca00ff37391798e9d4c5d73a58e4acfd24753b28fb3bfbd67d1c171e032f627c

                          SHA512

                          e450f5af63b40899c8655a554deec67cf100d39ce53e5afc8653acc6f1c4bdbaf0b0dd469684b649c3b2499123da96a783abd887508f15b686c0a6b4d0eae52b

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\a92ef20d-49d9-4f6c-aab4-5c6052808cba.tmp

                          Filesize

                          1KB

                          MD5

                          286798b5a53a55e9d5e885e5e2dec8d1

                          SHA1

                          bf807231f0bd5d000d3f074c9be205bae59a7502

                          SHA256

                          9622b2dd1c45fa2f97f38ca2fe02be4d5bbf5ff4e51c33bfe29711261d33e244

                          SHA512

                          67503fec2381760e107d8a267ed1b1d3c45d0adc29506dbb3f134bb45e612a4d14cad351a5f88ca2e3ff8425c95667089657fc2d178e3283ddcc11038de225ac

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          e982cd5e142b4d91ce2a827ab0ff44e7

                          SHA1

                          774e35a00de2fb7c52ce88a8fdb9a5051dadecfc

                          SHA256

                          d00360ab5a376d1df56b4d33dfba5a1de295d085376bb0b67659a07951c10ee5

                          SHA512

                          55db6305ddf980bd642362baceb186974ccfdfe72a82f82149e3cca53a339913d074022501c881112dba8929df518c8455a247b3f842960d2b9d7bc04e9c2c85

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          7521700711c6a506602fdf792bfbbf1e

                          SHA1

                          e82918fac6e2fc98576afdccc0b36562e225aa1d

                          SHA256

                          67111c4522cc685544be79f0f0bc6a51242a777a91fe198c90934a959b7a12d0

                          SHA512

                          d8a066b0a42f1027101c4e73d6dbc004c171898b0448ffa3fa13b45dd0dc8ca4d7e64ab048634ee7622f79b12e33c34be16e0aff9407ee6571e8a79f538adb47

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          f47676140e990abdc730a6b334ccb62f

                          SHA1

                          49c81730326f9a1294ce47e77daa29a2cfb1aeb2

                          SHA256

                          c9c97863e744f3edbf1c62118f5ef9fbb125c1f2a67e953b480ba88454fd2f92

                          SHA512

                          5286dcf448fb94114beca83472ab969c5c2926c7bab70550952b9dfa4a86e948d19bc989308283018ae931c064e1ca3fce0db29b6e0341ef2f87852728b790e5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          138KB

                          MD5

                          3774af37ca6830837681e161cbc49e7c

                          SHA1

                          e4ae98c33e1d876e5ba9bb7165a8e0f94527c106

                          SHA256

                          1cdbd51e158b7242464ee4f287a6eb1c259115c357dbd816c78db4939337074c

                          SHA512

                          392d267a69d6ad8872009d16c42ea2d22c43a668c7329f3e9b518b2394ca278a87e009f840f16b6739937fbccefa975d81c1886311211742fbd786a60d997679