Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
62s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/09/2024, 20:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.com/games/92063040779779/ESCAPE-THE-EVIL-DUSTDUST-1
Resource
win11-20240802-en
General
-
Target
https://www.roblox.com/games/92063040779779/ESCAPE-THE-EVIL-DUSTDUST-1
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133701292227571696" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1840 chrome.exe 1840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1840 chrome.exe 1840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4820 1840 chrome.exe 81 PID 1840 wrote to memory of 4820 1840 chrome.exe 81 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2864 1840 chrome.exe 82 PID 1840 wrote to memory of 2924 1840 chrome.exe 83 PID 1840 wrote to memory of 2924 1840 chrome.exe 83 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84 PID 1840 wrote to memory of 752 1840 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.roblox.com/games/92063040779779/ESCAPE-THE-EVIL-DUSTDUST-11⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa09dcc40,0x7fffa09dcc4c,0x7fffa09dcc582⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1772,i,7770334012259936107,13953360006987555680,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1768 /prefetch:22⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2024,i,7770334012259936107,13953360006987555680,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2256 /prefetch:32⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2076,i,7770334012259936107,13953360006987555680,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2264 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,7770334012259936107,13953360006987555680,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,7770334012259936107,13953360006987555680,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4464,i,7770334012259936107,13953360006987555680,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4476 /prefetch:82⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5a89869696be0db997c08eddaff30dd47
SHA17f7679f90d38938799d076d21e157815fd196251
SHA256fdff2cc072c781e72d29940335d47183dbb2d54c9aab2ae9384af19dca29f5a1
SHA512751933b4b2b10108829854a9142cd0c0fe14ec80a622d360fe897e398459382b50245b8544759f797b1fad493a7e213a99cb6908e5cc49b933f3a590f2da4e02
-
Filesize
1KB
MD5df17f328eec26bcc293e0d98372d97bf
SHA1ea2a95d78381244f05cd403789f4aee77c0c8abe
SHA256698ecab41442513a290e44913d3cde128d93e9d7a061f7361ac761a3125797a9
SHA512cea4e240a7734390fe14c59fd20a1076ef289cca5ddd3cc97deb4982bf49f64cb188ad4f4b88660b3bf18bb914952a8b10545ba115a640c909e285a1892bd7fa
-
Filesize
1KB
MD5eebd8cc357192d087720cd94fed6159d
SHA1300bdca28c4cd366689a87d9d213892b4792fa5c
SHA2560e2139e7e8b09381e557652925059001d562f1ee0e7f84e38ec78bb6ca9a8c3a
SHA5124683f33cb29de97678931723fea4155b22232fcd891176aead093196f8713ed01b44f7a11bac89d3e1fa5bc20e344ece6f31831e14a9f362aeb449ab84c44a63
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD505fc55f0dd2576a96b3279e89eb12633
SHA131e3074bab62079fd4e1c9828f889d925ab12082
SHA256242ccd2b17dcf543e0a9eff06f75521fa732ec64e94c2b6d9aadb49e851f1f19
SHA512f65720fb2fda03b37d89aef3ed9d5d49756f427e47165d0d5443917bd93df1a08c530b495b63d168aa6bdf1b030fbca7dfbcd84376c17527c3f7e8e0aadf7669
-
Filesize
524B
MD53e57f85a2c9e16d4bcefa7414f28708d
SHA1087464cbd8472f328dcad3125f0f45382518005f
SHA25615840f55a4257cdd9075f9476be1aec9ff3b54caafe3d43f3f1e51fb0908538e
SHA512b653d4c99357825dfeffc5703016db288dedff2cf5f553edf19e47c371f2b83be8f06c0497239e3cfb0684ba9cb9aef51aa43300298369cd350ed923d99f0207
-
Filesize
9KB
MD54a6bf2df53a72248d04f7261dd3b9444
SHA193cc54ca7605d24f33660aba8b42308e5674ef25
SHA256299ffd2dfbfe3e2a1e3e2eecc03abb7e00129e9ecbb9747f581fa901a4db8de8
SHA51216c8d4174157e47ac8b73c5800af3cd1cbd353a0d34ce7b1cefe5939fc8daa46b122500b6510141b899a2848fabd9045a5a11fec97252047034b0526ee69f213
-
Filesize
9KB
MD51e0983b2e1992ae935c5e05f440a1387
SHA16a0f069df38e75ae464d40d562cf292d356dc77f
SHA25678510f05c39cd5b8d1d1998f402e75d4f80f7fe935eaff3901f98272de6b00ee
SHA5127ffd807ec42a178ddb86cefd0cd15aa047b7226d1a26307dd07d4c75c69cb7fe11950435d32586877bccfddb125fae73d1b7bca929f87b691804ffb7782f47f0
-
Filesize
9KB
MD56cc09636adf1564cf65a1732e79eb3b9
SHA11c27eaae06f4a22e6a2abd9d332a8bc4446c7dde
SHA256a4f25022a9f62f2f40ae45a22f10d1c2f15d9e7159bf596db2cef7c65099e6d1
SHA5121347823d9dd395cc82691ec9dacbfdd6b88be6446ede666e9361e20c673ab00c0cbb7e7aac28adb6e18d9c8951dbbda26bb6e4ec04d17c37955cc69d6b3b3d59
-
Filesize
9KB
MD5d4d0a4914916424e9ec2ed62dabc2408
SHA1e3e660a490a25ef253a54fc1e5ccccc42fec5168
SHA256173f9052dcdcf84dacdb72789aca71aae0bb92d7262de91ffe0b0d1e0ab2a34b
SHA5120f87122da6849ac414e57ef341e13de11ddec356c3da44e9305290a6ac4c29974c726608cb8943c512d9c32fd3ddfff22ed2ffdd05389098f3dc5521fb54ff17
-
Filesize
99KB
MD53759e3f1d17140551223c988f8c1c8e8
SHA1b976b67955a0cc135fa2301e9dfe92cf023bba96
SHA2566a96308adf24d2b24f4075a472bff31874849e6c2647cc14827e6a2979371e78
SHA512c714812511087cd0607f6f3f3cb06b51e085d251bf3391d39575635673e52ad4a1ab525938106c2b0e2859b2ad8fe13d16b25fbe52cc9782d7645c8a17656d28
-
Filesize
99KB
MD5d2f5a3f847380dbd71ac9e6fcee3afe2
SHA16c4e27295d21c67ea187c92834579441986d544c
SHA25617876865d289d5895ba074e542fa46ed09871d6ed80daafb5fb608cb6e9e13bc
SHA5129d86701e4ce1d921e264185dd83e487d8f233b03b7bada073853e2956532a934f2f75fb88948b9798a2e7d2dc40a3a9504fdc49dbe33964f436a65dcc152b8e1