Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
287s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08/08/2024, 14:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://vencord.dev
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
http://vencord.dev
Resource
win10v2004-20240802-en
General
-
Target
http://vencord.dev
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133676021561983529" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 2748 chrome.exe 2748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 4152 1580 chrome.exe 72 PID 1580 wrote to memory of 4152 1580 chrome.exe 72 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 4648 1580 chrome.exe 74 PID 1580 wrote to memory of 908 1580 chrome.exe 75 PID 1580 wrote to memory of 908 1580 chrome.exe 75 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76 PID 1580 wrote to memory of 656 1580 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://vencord.dev1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffdc6339758,0x7ffdc6339768,0x7ffdc63397782⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1512 --field-trial-handle=1840,i,8206794924684572049,7401100074708300201,131072 /prefetch:22⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1840,i,8206794924684572049,7401100074708300201,131072 /prefetch:82⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1812 --field-trial-handle=1840,i,8206794924684572049,7401100074708300201,131072 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2612 --field-trial-handle=1840,i,8206794924684572049,7401100074708300201,131072 /prefetch:12⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2620 --field-trial-handle=1840,i,8206794924684572049,7401100074708300201,131072 /prefetch:12⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4344 --field-trial-handle=1840,i,8206794924684572049,7401100074708300201,131072 /prefetch:12⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1840,i,8206794924684572049,7401100074708300201,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1840,i,8206794924684572049,7401100074708300201,131072 /prefetch:82⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2316 --field-trial-handle=1840,i,8206794924684572049,7401100074708300201,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD553e0842893bae34cfc8dc8c7203887f3
SHA13b599110b7b3bea4924e1380399903d410664507
SHA256452c49c3285e2a0b307893f14a1fd1b77b29156b35e26d33b31c31ebff030bab
SHA512554869862241c13830c095e530deb1cb0980bdac9cac04c939924b0084446276903edc4e7f13c8bf73f3f006a595420bc73fda3c3814936a99ac920b533a2a6e
-
Filesize
702B
MD5bf75a2310792009727127fc40f89967a
SHA13d93acc3ec4083824fdf738eab9f7965ca96281f
SHA2561bce668aac639d8c33709712d37987f7a743894a79fc4acab6b9e34ba08f4619
SHA512dfe981985fbf9e6550ac5e85a34c2896fa3be01675b5c23191ef72dae9b19b4353de2852610057c8de18e88dca83dbd654e30ebc2dc77ab6ef394f15eb451ee5
-
Filesize
6KB
MD55b8c9889acb65a21ec2491caa2e6245a
SHA19f62f94f0709b79674f0a7bf0f33710585e133b7
SHA2562fb35c245d61f177cacf0ca5c770a20ae8f9e46a1b15b6c8b307eabadf7bc600
SHA512a9cb24569a43d7281440e97948a7da14478c06de0e904e8d53870bee21a27b75b1623372b39fdbb07b22b1791c061c89cfe44c3e41c31f0facdd8f1a747ae7d2
-
Filesize
6KB
MD53125c4eb84de8f582d958fe19c3c6f3c
SHA158017c33064534dd5aa78581e7a111e310903e19
SHA256e44de439a63396b44df3bec9125c9422c1e13581d22fd03c008961e49715d6c4
SHA512d703a966a2b6b530f48a5e5b65d3214fee1539393dc3929f875d30a1b05700487990385481041123bfe4aefffa4b026492cc516b349b9dbcb6ee535a95cde7ff
-
Filesize
6KB
MD55c795e312e204c5d60c3542c717ec72a
SHA1a00f1203b71723589bbc4fb2997f9ee114e6b23b
SHA256fe7559a1a6f49b3b9b6c54ffee65ecafc4c44e50afd7ddfccae61d57e3fbb632
SHA5124c136721a5c51d100970100e5a700ad397c705f5aaea667c7c193f5dd2dd8ec913bd81257b8616c11845b9c46af061340dcc33711952a8e86dfe36876ad96099
-
Filesize
136KB
MD5dab038dfb7a4846936ae831e355dfd26
SHA13d744775b2137dcc2e401937bd1b3dae2ebbeccb
SHA2565ab85c8cebb8d7ae98805b45abab79d1c59da52930a536e533a8c9c1818d0cb0
SHA512e927cac6b95f7492fb32f97d5e34257f4723daeb1def2e66866153b9c220cc9da79ab694e28add26c9da51c110ec285cc956ddc5537450663914290acd31becb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd