Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06/08/2024, 13:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://blox.game/summer-surf
Resource
win10-20240404-en
General
-
Target
https://blox.game/summer-surf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133674241985903829" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 5028 4912 chrome.exe 72 PID 4912 wrote to memory of 5028 4912 chrome.exe 72 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 4000 4912 chrome.exe 74 PID 4912 wrote to memory of 2084 4912 chrome.exe 75 PID 4912 wrote to memory of 2084 4912 chrome.exe 75 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76 PID 4912 wrote to memory of 3528 4912 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://blox.game/summer-surf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa8b599758,0x7ffa8b599768,0x7ffa8b5997782⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1512 --field-trial-handle=1900,i,12142767758105154994,1823207381128377161,131072 /prefetch:22⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1900,i,12142767758105154994,1823207381128377161,131072 /prefetch:82⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2044 --field-trial-handle=1900,i,12142767758105154994,1823207381128377161,131072 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1900,i,12142767758105154994,1823207381128377161,131072 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1900,i,12142767758105154994,1823207381128377161,131072 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1900,i,12142767758105154994,1823207381128377161,131072 /prefetch:82⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1900,i,12142767758105154994,1823207381128377161,131072 /prefetch:82⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4992 --field-trial-handle=1900,i,12142767758105154994,1823207381128377161,131072 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD546f138bfbe6dc2d48923b974939a5798
SHA1d60ac88203ddda77d80a9a1c8266a9c61b8572b3
SHA256b0414eb24034d4399111b927874f2baac7251782c54fb396f7b13178f700e615
SHA512b0fcd1320852f5a91436f5f3124a7b8d3e1ba56de9aed0a2718fb600345fb30947c59b41a737168fe6241114634acd159fa7874c2d0ee4a543dd67c68dc67065
-
Filesize
1018B
MD5e16f60f6728ba17d85ab03117a8e6dc7
SHA160d731bfcf3131b6335dcb969512057ada8c9c9b
SHA2565cdd10673e4ea4be1bd912cdd30fcf303c2a4d2027ccdd6e8da9fbcc69bfa40f
SHA5120f372c34c6a2abaf54dade891d96879883ff0e8d45df6875108468440f523008688ae88ceb794bcccb5170cd7fbc5cfbc49119a22d5a76c6390bf3b18c731cf8
-
Filesize
1KB
MD5d955d2d4a0a77d63dcc9a5f6613a6259
SHA1bf2e23abe5de859bf1f237d49a98c315ee4f3b38
SHA2563f7e79f10d8573f09728c813e008ed6e0c70a5d27eff5f538ff652ca1037fd6e
SHA512e2ba13189f8e47872727c451f7fde08c12908d956f11fc6d9f782eac5ff992b860007b17b740460eaa814ef4ebd1a04c2fe2d059b395fe5acb05e6a7b58e846f
-
Filesize
705B
MD50cb14e2542c805a7f4e50573e06767d1
SHA1d501073552294b8530249c6ba3e06420e2dea609
SHA256dc529f6f47b5e031801cd2d0402ebd166d3a122c9fa40705520ee733aebd1cd4
SHA51223c670d9d48197f6c59adc9d403ca9c9c104c5d5027a6de1411f411aa9706df562f759c5c8589aafafdcddd45c863d1ee1e8d8bcb11b2a6d8e72469dfc237373
-
Filesize
6KB
MD52035e97cb68ef11c9548c669d9d19101
SHA18bfbb50bb2432883b066ce425a9dece9fb851672
SHA256c37070f67ce67566c0d8ed65cf0822c070ea491d8f56220cf2ac388dddc25117
SHA5121ea39fc33ba9e031cbd4c50cba198920591e818b40e03cabb0af8af2841ac9fe67b907743dd5767b13826cbd46efd37f872ebba390c5d264cba93b55f86357ba
-
Filesize
6KB
MD52411ea2ac015031d41919d8e2ddcff9d
SHA12ec4510f30c24833814e966a5ec88a2a896f224c
SHA2564394ee660e30d2a4b79544477cb1de27d9c185d5c1a814fb30f71dd4d4d005c7
SHA512710e2abb46b971532c92392b221109a32cbd43a076dfa53e9df417e6d08a8d4554cfb2b2e613f517044ad712891dba2ae2ea9670dd2e943e89ed7cf89705bd39
-
Filesize
136KB
MD53642a19c7eda66fd1e1cb7fd0a1b4f4c
SHA14e47d0e74900a5c4a7eb3b1d92710c1c41541c58
SHA256a33e0048cc7dbf4b881e26b46119654b295a7b9461a070ba9df7cebfb4321dfb
SHA5128de824863385c847e1a649e4bd31fb723e6c15fb0de4f86890e07ebb6182ed72eb7cc8e56ba631c73e36bfe1baf4e626a200b8c2c46f95676f92dfb6aee49bf0
-
Filesize
136KB
MD59a479fdde77c9e721728d5b2913750c8
SHA1373bac43c9ea610bf29c6982c0942f94c612c866
SHA256ef44d48546d75fe6a7ee851824674b6a281fde472f2aaf09ddf048d3b6803ac5
SHA512857dee57a9fc1bc9aa9615c04b244286d7f1bd91a82c7f194c2968e47a1b1f37f7c781a6c327c79cd775ccf5cd2a4606577a7143ed91e8039d91a6c928f71936
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd