Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
25s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/10/2024, 12:18
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dragonships-maritime.com/1/?AmTUNhnnaHwHEciL5kXB/AmTUNhnnaHwHEciL5kXB/#[email protected]
Resource
win11-20241007-en
General
-
Target
https://www.dragonships-maritime.com/1/?AmTUNhnnaHwHEciL5kXB/AmTUNhnnaHwHEciL5kXB/#[email protected]
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 2168 chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133730363379413496" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3484 2168 chrome.exe 77 PID 2168 wrote to memory of 3484 2168 chrome.exe 77 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 3876 2168 chrome.exe 78 PID 2168 wrote to memory of 2824 2168 chrome.exe 79 PID 2168 wrote to memory of 2824 2168 chrome.exe 79 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80 PID 2168 wrote to memory of 1300 2168 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dragonships-maritime.com/1/?AmTUNhnnaHwHEciL5kXB/AmTUNhnnaHwHEciL5kXB/#[email protected]1⤵
- Drops file in Windows directory
- System Time Discovery
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbef0dcc40,0x7ffbef0dcc4c,0x7ffbef0dcc582⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,16781452275434849551,11813450096681596817,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1788 /prefetch:22⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2064,i,16781452275434849551,11813450096681596817,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,16781452275434849551,11813450096681596817,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2340 /prefetch:82⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,16781452275434849551,11813450096681596817,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,16781452275434849551,11813450096681596817,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4520,i,16781452275434849551,11813450096681596817,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:82⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5785932a97a4a21b280cec864b7550dae
SHA14d20843e73e117159357207bc75e26defd2f0667
SHA256e10298303146a93c61d09ae6e3866d38e91b86104ea1b674f73ed585cfbe0b4a
SHA512742d82432955b07309721195f98199d0647de0bb0982cad66592ff37b5b8c6b378d615401c6180e15e6c88eede380846f8da902a86f8218795eaa0eb09798304
-
Filesize
8KB
MD5e26a3f58de72cbd3260ff64c2e585f22
SHA1bb18b229293f5cacbe2302a4ab244dc0d6ae3fed
SHA25666a81df725a6c78e503765a7af62806db558a03bae9827eaf6ad533b90edb137
SHA51251d1be230b94b584ccc58ab00d804c365ebe962e6db282e1109c394b78bdaed70f0ded925716c7f2b8d9be6f6923b58305dbea81b3a20df04d58722ed22e5055
-
Filesize
228KB
MD5675c06677dd1093bf90127e547ba4cc5
SHA1e17c6abe240646c82dda420c8b6a591c12871b83
SHA2560a1a206609d18e9327ef906d24bf603d0a4dbe463f0837226e26e7ede96a8733
SHA5126159491230eb7470193df4ed82d30fc6b946cf78ce8be47d6e4228cd4e463de53eb1a14b9b6da4e82e0c636d56b206d6fd486ca00999d8965e99b5db8d1e4195