Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 01:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://raw.githubusercontent.com/EpicGames/PixelStreamingInfrastructure/UE5.4/RELEASE_VERSION
Resource
win10v2004-20240802-en
General
-
Target
https://raw.githubusercontent.com/EpicGames/PixelStreamingInfrastructure/UE5.4/RELEASE_VERSION
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 raw.githubusercontent.com 10 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133724799111495148" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4212 chrome.exe 4212 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4212 chrome.exe 4212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe Token: SeShutdownPrivilege 4212 chrome.exe Token: SeCreatePagefilePrivilege 4212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 4944 4212 chrome.exe 82 PID 4212 wrote to memory of 4944 4212 chrome.exe 82 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 1740 4212 chrome.exe 83 PID 4212 wrote to memory of 4588 4212 chrome.exe 84 PID 4212 wrote to memory of 4588 4212 chrome.exe 84 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85 PID 4212 wrote to memory of 1128 4212 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://raw.githubusercontent.com/EpicGames/PixelStreamingInfrastructure/UE5.4/RELEASE_VERSION1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe0743cc40,0x7ffe0743cc4c,0x7ffe0743cc582⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2004,i,7345312354389154833,7416814259572118348,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1988,i,7345312354389154833,7416814259572118348,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2052 /prefetch:32⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,7345312354389154833,7416814259572118348,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,7345312354389154833,7416814259572118348,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,7345312354389154833,7416814259572118348,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4556,i,7345312354389154833,7416814259572118348,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4572 /prefetch:82⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD58845a9c13739ff540476ce5c68c29c14
SHA11bbf7627ed041075f6a453a2207dcb15d532e626
SHA256363666c018fa17d43ea3ce8ae304b753627e2828db29140480bbf585e562d32a
SHA51223f43f9d4e8e1c27af87436af2b5b87ac5862ba0566f5236399c099f67f73a27bd7aed70ac032cebd5fe7d575e2dd9349b6dd8769a437b6157574dcee0310171
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5020d3d684e1dbeede85dd6648edcb1f0
SHA113efede404b9ec66909b4a0b3b5a19a202a65117
SHA256d1cea867d0ceabefba88dba1fb519d07d6f2adf1179e165034185417238fbf99
SHA51233144fdacb6000e08027f49802f74dcc74b6d82fa46422a1be71700d25bb2b4814b72d866782516a0daa8eac5d533bf83d1fbdfa21bc40a5b539cf56dde4d44e
-
Filesize
9KB
MD560b22cdb24c896f497f766d4dbe19a9a
SHA140c2a952abab61bbd5cda28d647f85e67f826180
SHA25658523841da1b2d9a7eb0636b7ea11b9a8d1118780b5a983bfba3f4d6bad5f3fc
SHA512296b032a2bc5fbd579a5e5ae37920042f6a9515546c6b78a37c296b9b8faa1f6d95570759c387ac5b93c44de8c2ae08c22a31d279633a9d9fb767c793d8e9269
-
Filesize
99KB
MD57a78c0200b47c58145b49d8fbc1aea70
SHA1764e4cff6300f4313476bed6e7ad4951447b192a
SHA25655e9f5d4505693fce0525127df57ab4e768b09d9fda7c763da222521d9eb10e8
SHA512890a0f61bc3f94e2c4475522dc7c1939bf338fbc714c3b4f58f278aabbb71d14bc2f64836ea19bd2aa1c9165633fffcdf4ed2ddde5c201aaf22dab0f12af3b80