Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
487s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
26/07/2024, 11:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://doxbin.net
Resource
win10-20240404-en
General
-
Target
https://doxbin.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133664744138201379" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 660 chrome.exe 660 chrome.exe 1596 chrome.exe 1596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 660 chrome.exe 660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe Token: SeShutdownPrivilege 660 chrome.exe Token: SeCreatePagefilePrivilege 660 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe 660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 660 wrote to memory of 32 660 chrome.exe 73 PID 660 wrote to memory of 32 660 chrome.exe 73 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4840 660 chrome.exe 75 PID 660 wrote to memory of 4728 660 chrome.exe 76 PID 660 wrote to memory of 4728 660 chrome.exe 76 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77 PID 660 wrote to memory of 4808 660 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://doxbin.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff844239758,0x7ff844239768,0x7ff8442397782⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1844,i,9364666397414458560,4350723618789622223,131072 /prefetch:22⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1844,i,9364666397414458560,4350723618789622223,131072 /prefetch:82⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1844,i,9364666397414458560,4350723618789622223,131072 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2828 --field-trial-handle=1844,i,9364666397414458560,4350723618789622223,131072 /prefetch:12⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1844,i,9364666397414458560,4350723618789622223,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4440 --field-trial-handle=1844,i,9364666397414458560,4350723618789622223,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4416 --field-trial-handle=1844,i,9364666397414458560,4350723618789622223,131072 /prefetch:82⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1844,i,9364666397414458560,4350723618789622223,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1844,i,9364666397414458560,4350723618789622223,131072 /prefetch:82⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2456 --field-trial-handle=1844,i,9364666397414458560,4350723618789622223,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5bb34a5ae98cdaa6ba5affb895349b315
SHA1a320be6ee947d8026d78bb2dd1e4b44b89f5d1e7
SHA256aa4e00a12dc666c69ac11b03fa6d0094b379e756c8028f9aaa0c3174c46da327
SHA512b41b605b08ae048bd2c5459566c9bb48f2963edd8752a30a8aeaab7731c515cdd392e22ece59d270064874c9e24b982af139877dbc9c6faad9590d5ebddd8b52
-
Filesize
1KB
MD59a5d426a1ca4f56e719a2dadc9283b02
SHA1f1f53e0210ccb7629709d77101a7138395ee4368
SHA256066632c897e11839b5462693bbc80e2de215b27537c0262747fb025e76bd4ee4
SHA512368d9ce90ab0b06d0c0d14ae90db712256c28e1e812994a04f3d886514b2121e9116455bc65d2c6a43bc957387a98a75e35eb05fed1865c51d155c9cf5322826
-
Filesize
871B
MD540be10c639ecf1db9648031573c8eed7
SHA118e7e072a9a0e90e81be23be4eb16e93efc02e57
SHA2569e93dcd5877c6df3192f322b1537dd7458c13d7b4aa738f968ca3c74ccdb17b6
SHA51204e5165e3248863a02449e4ebfdf28b6fd2fdb3ead9e41aa0579a8cbf8c74f702c9d8a7516c79e31632bbc91bf24be2494e2e48c4c7b294a49a6784a7db7c33a
-
Filesize
6KB
MD5f68eafd476a4c374013d01f1ef150caf
SHA1ab933b804c13ae450bb1c40ed760e18a564e3665
SHA256052aaedaf0155c8653669815bc249f0f4a37a8ee0d7e8d951eb99207ef5786b4
SHA512e1cdcf5de3275659ff51cad2c90ec432f51f7c521aeb1d0084e496c5c3174eff17b3e29dfe741848f7ad60001d80ff474fe35e0caa10088b0381e3661699c662
-
Filesize
6KB
MD54ee3934b6899ce005f1266c0616b572b
SHA13506ea034179710c2e86fb616bcb506b92b5bedc
SHA2569ba8a740501ac03aed1bc4170e1da024d03deb35c1dba109ba8e54e80c96b1de
SHA5124f33b73112c16b498ee088dee650785095eaf831a9d079270c45e6258586d2df9579fbca9caa66faae0fc3ef4ee0c140d5519510f4b09a01dea8b5951ee0ca7e
-
Filesize
6KB
MD542d875e0a878cb29554753baccd18091
SHA1491791a5e1d408a28c9c4a5811f4b3f53385f7cb
SHA2563338d8e51f2a2dc2397d6ac6b89f4158415a6149c438109196bf3eba5e4bdb1e
SHA512b4b90c9495c648b87017ff778830d9aabdba1ab0e03a6f7459b395400d531022772cad5530d9aaa4287b4f4391c77eb9e7da4f9bf18dc6832bb182c87247d818
-
Filesize
136KB
MD5f7d91762c2845199d66b84e334b3099e
SHA153be7e38b843bc6a516b75c185c65407af1addc4
SHA2563119a4f064faaa1e9d9e54bf14bacdbae11236b495f48d12be96a2745fe52bd6
SHA512b383cab7dbf703785ded274ad36f91d31fc3b676473b34cfcb6696435f3af02a6447e92bd957732fae9cfc11e9cdeb19315834741c7058f1b4470cff10a31c51
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd