Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
Document.zip
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Document.zip
Resource
win10v2004-20220812-en
General
-
Target
Document.zip
-
Size
5.7MB
-
MD5
00fe7c67c2f28e38cbbd95ad1c38ad82
-
SHA1
0de5c048ba27623904a62171682d38e22495b872
-
SHA256
f0e8ccd2f98ef6f6a4cf2282853e6418a8f3a8873d4eb7d25c5ff20b284d7414
-
SHA512
f45df1fef179701333a1fde4a133e4a12b2d64f86f1fc0766af2817f97bb6770e05d4cb881650d0891c63dcd815cd38fb99c78dee00ec7ce3734541fe2913896
-
SSDEEP
98304:THBDWThB8SStGYh6wmkQFZjseH2cjH//HKcExP4HrgvNSodXI/T+Okr242i:rJwzNSt+ZkUZ5HHj3KcmACMTDK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1716 chrome.exe 1328 chrome.exe 1328 chrome.exe 2368 chrome.exe 1328 chrome.exe 1328 chrome.exe 2472 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2040 1328 chrome.exe 28 PID 1328 wrote to memory of 2040 1328 chrome.exe 28 PID 1328 wrote to memory of 2040 1328 chrome.exe 28 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1936 1328 chrome.exe 29 PID 1328 wrote to memory of 1716 1328 chrome.exe 30 PID 1328 wrote to memory of 1716 1328 chrome.exe 30 PID 1328 wrote to memory of 1716 1328 chrome.exe 30 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31 PID 1328 wrote to memory of 520 1328 chrome.exe 31
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Document.zip1⤵PID:1272
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefaa24f50,0x7fefaa24f60,0x7fefaa24f702⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1020 /prefetch:22⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1704 /prefetch:82⤵PID:520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1964 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2000 /prefetch:12⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3228 /prefetch:22⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3440 /prefetch:82⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3548 /prefetch:82⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3852 /prefetch:82⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3948 /prefetch:82⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=544 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3840 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3884 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4184 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1004,5672285176414597318,4474895072206791724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3192 /prefetch:82⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:1160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefaa24f50,0x7fefaa24f60,0x7fefaa24f702⤵PID:1884
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5fc80069047253d14d66fd16a255ad052
SHA18d3e6dce271e7ba912de2210f45a660471545c18
SHA25638a76ddc389cf166479defcfd4317d44780584376d13350aaab69a6b5e96c693
SHA5124e64e4d6d9c0a457ea95de1bbb204ec91d35e9bf1f3c027c954c575ed9be2e0cbdeea633f8f3eec8c235c27c9f99ed5aa502058037ce569279fc5de46900f93e
-
Filesize
40B
MD5fc80069047253d14d66fd16a255ad052
SHA18d3e6dce271e7ba912de2210f45a660471545c18
SHA25638a76ddc389cf166479defcfd4317d44780584376d13350aaab69a6b5e96c693
SHA5124e64e4d6d9c0a457ea95de1bbb204ec91d35e9bf1f3c027c954c575ed9be2e0cbdeea633f8f3eec8c235c27c9f99ed5aa502058037ce569279fc5de46900f93e