Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 20:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://zgska.balontiup.xyz/4ONFLo17271aZaE1520uvgdubxzqd14478ONUINGXEZFXAEMR218056VCOZ19892n9#50gojjcbvxha2gewtrnnlj1zg573xqme7ljbsm1mngph6elg8g
Resource
win10v2004-20241007-en
General
-
Target
http://zgska.balontiup.xyz/4ONFLo17271aZaE1520uvgdubxzqd14478ONUINGXEZFXAEMR218056VCOZ19892n9#50gojjcbvxha2gewtrnnlj1zg573xqme7ljbsm1mngph6elg8g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133729788281536066" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3616 chrome.exe 3616 chrome.exe 4784 chrome.exe 4784 chrome.exe 4784 chrome.exe 4784 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3616 chrome.exe 3616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe Token: SeShutdownPrivilege 3616 chrome.exe Token: SeCreatePagefilePrivilege 3616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe 3616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 3400 3616 chrome.exe 82 PID 3616 wrote to memory of 3400 3616 chrome.exe 82 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 4868 3616 chrome.exe 83 PID 3616 wrote to memory of 3688 3616 chrome.exe 84 PID 3616 wrote to memory of 3688 3616 chrome.exe 84 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85 PID 3616 wrote to memory of 2540 3616 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://zgska.balontiup.xyz/4ONFLo17271aZaE1520uvgdubxzqd14478ONUINGXEZFXAEMR218056VCOZ19892n9#50gojjcbvxha2gewtrnnlj1zg573xqme7ljbsm1mngph6elg8g1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd4,0xe0,0x7ffdfeabcc40,0x7ffdfeabcc4c,0x7ffdfeabcc582⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1992,i,14676927467105083817,8343255193093945837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,14676927467105083817,8343255193093945837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:32⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2144,i,14676927467105083817,8343255193093945837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3040,i,14676927467105083817,8343255193093945837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3080 /prefetch:12⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,14676927467105083817,8343255193093945837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3880,i,14676927467105083817,8343255193093945837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4624 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=984,i,14676927467105083817,8343255193093945837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50613afb479565ec6caafb1ccc53456dd
SHA1d25c353e437e01c8b5362166a0311d1e467edacc
SHA2568d24eb959e4f3c81191f88f91cc2a4392c9789a35b28f4c489cbe986736c1f31
SHA5126328607124e0a7eaa442b50b4f6563c2c07dab3fa8659fbee6024456e474e5d3be465227a9e7757a7b9b282c32b115f8032c94b39016bfcb4b350f3ae4c85801
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD525bb85746475275b7e68f5d137c03000
SHA1b4842d7d5bd00e4fd3467059867d0f84559966e1
SHA256d02883c67d026a3d6cb4929cff4c7bc864a7e99659f50fd0bc177eec4b7c6c3d
SHA512af27d4e748643d9952d47acd98233e0e49b96e3ef1f1957e0aa037c371b67cfcd71aadc967ff50479abb9e80bc1c814ee1bc8d6349d29f2d5410f259222ff77b
-
Filesize
9KB
MD50054c274aeb816eb3b7345887a292f51
SHA1a86d360b43b319924cda647067942dc323f96901
SHA256b81480c23d86b56ef1a5ddf346194f360fba089d929b0888368f287631e082d7
SHA512342510c8da0a59dc9395f919612ec03d61a79c9763f29c7a3422d38d8fc18df50d23f13d761fb979191142cfa220eeecebe7c0ff7fd14d01ee0b21b51d83d66f
-
Filesize
9KB
MD573b9c0a803d1a9e1ccfdc51daec0f42e
SHA180d6dc3e2f54fa10c3ceddfc8491ae1ba3a38ef2
SHA2563a57f1aacf6844a811775cf86786bb32dc41ed25af76960cb561ae2a28eff656
SHA512ba85f4b278f61e47ad31a01f1e8ab108e4d07308db0f3e9b4b867138d985a2bf48f8821eaaa2f1a705c164eb2954190e8a5aae13222497fc92808ae267a207cb
-
Filesize
9KB
MD550947e1d6dbe4805407fb5bde8711315
SHA1a33cfb0cd39b36a82c0a24d41ac6691e70788c85
SHA2569026d541b34e6db7ca50583f912de65f13711536e3312fdc1f987a6af031891d
SHA5127a8e1e6140382440efe5bae0d8e0aed127584b9da3f1be724b9739c39d54a5fd54978e09ba15222069fc66049b54297327eafd4b2b96dbd3f5c1e0abdf5c546b
-
Filesize
9KB
MD5cba953468027fa16e452a598279e966e
SHA13b1afed74caa4dfe4dd262a16cdaaac2f01e5481
SHA256225774cbcda0e14dd20a04a3b10eda33ad5d00b41e44ff7bfe0bf59dc884e12a
SHA512ead64dfcd198288be1305423bcaef08ef7485d596c963b8fecef1eac0aa80c54d370ae3a381e9cf76047e5efb5290fd6950e5abd00be4ef489e19304b61e2eb7
-
Filesize
8KB
MD5c8b6e8fdc1f6e1c161080d57ad9558ff
SHA1b4c96f5b92ba056b60e270e3a6864b983e5ca08e
SHA256aef13a98f02e78d95517be1a9c6f1fe781d38488d74bf0f1c5c4b1626ea2bfa4
SHA512fb557e25070e8f973c45fc8d9addfa56fb59a814fed8e3b2f5e95fa50b882aebcc8a81c8ee4c56031196fcbabbf36f32968bd62ae25926a4cc6765850c5328ea
-
Filesize
9KB
MD5a9a3a86c43c34383e38e411f1a333322
SHA1f481f6b382fdedf1b4a53db89ccfd9abb0057d8f
SHA256b00907f8eee91420eb7328d55aece8302985cec33186229a0823c234f5109a87
SHA51228b6f0d9a8e05b4372bd815200369b70ce374c62e994cd53603f7028448cd0dbe13838a9371676bacf30c562e2e9fdfacdfec24cb92ab48c9c1e268fec6e87f2
-
Filesize
9KB
MD50593a4fa6170ebb8122ca2653c90ede8
SHA1cd20775ba60b17bfb030c8d1fd32b418f2f5dcfa
SHA25696c208a3f039122de9712e61e371cae79f7ee0158912fbcf041465515e8ba80b
SHA5122883c44ecf702fc3704a3efe1180cfbece2e347d28aac9124630471842c43137f999a2c4d3613cf2cd69a8755827d87203e03d0be24dd7911ace8fece48f1198
-
Filesize
116KB
MD53abfb374d318206967ad71231f71baa8
SHA159c8aa1b6b6aa4ca43001caf21178ff0476a815b
SHA256298291e029b2d74d9e43aa3c09a7a8508e9cab3bfc16543014900c4146ffdcad
SHA51223d86b2e6679774dfa20769f9c414dce1843055aa2b0bdd3b352db7abedcf8a53fe28a6018ad0112516397969379a308eb0d0507dd9de6160568af0161d04955
-
Filesize
116KB
MD5c52a2bb3dfa1939147f59dd611560cf7
SHA13b14b360110e95d131be9da55e7467a149c06c8d
SHA25661fdb77d8c51b5b50dec43534def612fc867fd42609d053b36a08c3915bc54f8
SHA512b0c736f9d9be3e48c093f9b7fe8bf05f30493618681235404935c75df67cb20bb6ee6ad5ab0a228377c81a29214bfd1617c09b8384d6358afe9df0a7e613609a