Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
01/07/2024, 15:02
240701-sev2na1fnq 801/07/2024, 14:43
240701-r3zjbaxbld 101/07/2024, 07:26
240701-h91khsyhlc 1Analysis
-
max time kernel
599s -
max time network
490s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 14:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://playboxgamemix.netlify.app
Resource
win10v2004-20240611-en
General
-
Target
http://playboxgamemix.netlify.app
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643186560559484" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3616 chrome.exe 3616 chrome.exe 892 chrome.exe 892 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 372 3616 chrome.exe 83 PID 3616 wrote to memory of 372 3616 chrome.exe 83 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4304 3616 chrome.exe 84 PID 3616 wrote to memory of 4560 3616 chrome.exe 85 PID 3616 wrote to memory of 4560 3616 chrome.exe 85 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86 PID 3616 wrote to memory of 2352 3616 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://playboxgamemix.netlify.app1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffca75ab58,0x7fffca75ab68,0x7fffca75ab782⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:22⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2252 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:12⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:12⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4252 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:12⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:82⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:82⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2948 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:82⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=876 --field-trial-handle=1912,i,6935161368382207708,517298308398532930,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:892
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD571892178f6b2576434a1cd02684d885b
SHA12cf214bd04d35feedece9fe159fc364795dbe018
SHA256ca00ff37391798e9d4c5d73a58e4acfd24753b28fb3bfbd67d1c171e032f627c
SHA512e450f5af63b40899c8655a554deec67cf100d39ce53e5afc8653acc6f1c4bdbaf0b0dd469684b649c3b2499123da96a783abd887508f15b686c0a6b4d0eae52b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\a92ef20d-49d9-4f6c-aab4-5c6052808cba.tmp
Filesize1KB
MD5286798b5a53a55e9d5e885e5e2dec8d1
SHA1bf807231f0bd5d000d3f074c9be205bae59a7502
SHA2569622b2dd1c45fa2f97f38ca2fe02be4d5bbf5ff4e51c33bfe29711261d33e244
SHA51267503fec2381760e107d8a267ed1b1d3c45d0adc29506dbb3f134bb45e612a4d14cad351a5f88ca2e3ff8425c95667089657fc2d178e3283ddcc11038de225ac
-
Filesize
6KB
MD5e982cd5e142b4d91ce2a827ab0ff44e7
SHA1774e35a00de2fb7c52ce88a8fdb9a5051dadecfc
SHA256d00360ab5a376d1df56b4d33dfba5a1de295d085376bb0b67659a07951c10ee5
SHA51255db6305ddf980bd642362baceb186974ccfdfe72a82f82149e3cca53a339913d074022501c881112dba8929df518c8455a247b3f842960d2b9d7bc04e9c2c85
-
Filesize
7KB
MD57521700711c6a506602fdf792bfbbf1e
SHA1e82918fac6e2fc98576afdccc0b36562e225aa1d
SHA25667111c4522cc685544be79f0f0bc6a51242a777a91fe198c90934a959b7a12d0
SHA512d8a066b0a42f1027101c4e73d6dbc004c171898b0448ffa3fa13b45dd0dc8ca4d7e64ab048634ee7622f79b12e33c34be16e0aff9407ee6571e8a79f538adb47
-
Filesize
7KB
MD5f47676140e990abdc730a6b334ccb62f
SHA149c81730326f9a1294ce47e77daa29a2cfb1aeb2
SHA256c9c97863e744f3edbf1c62118f5ef9fbb125c1f2a67e953b480ba88454fd2f92
SHA5125286dcf448fb94114beca83472ab969c5c2926c7bab70550952b9dfa4a86e948d19bc989308283018ae931c064e1ca3fce0db29b6e0341ef2f87852728b790e5
-
Filesize
138KB
MD53774af37ca6830837681e161cbc49e7c
SHA1e4ae98c33e1d876e5ba9bb7165a8e0f94527c106
SHA2561cdbd51e158b7242464ee4f287a6eb1c259115c357dbd816c78db4939337074c
SHA512392d267a69d6ad8872009d16c42ea2d22c43a668c7329f3e9b518b2394ca278a87e009f840f16b6739937fbccefa975d81c1886311211742fbd786a60d997679