Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/12/2022, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
KSP_x64.exe
Resource
win7-20221111-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
KSP_x64.exe
Resource
win10v2004-20220812-en
0 signatures
150 seconds
General
-
Target
KSP_x64.exe
-
Size
642KB
-
MD5
f8c1625331d540f735facaa7c0d77886
-
SHA1
1c1c39ee6b8621b957c5ceca697f63171a2b1f31
-
SHA256
246ad925acaca9fce7a9b9cac91debfcf1eb1080e6cb6d70fafca5aadf49487e
-
SHA512
a2cdf628a5fea347681447eabc75b9c61c3d02e2f849358a0370d966b83fd16300083a40b3dfe4b255f12f4c6dbb15c111a46188731a34003a2c39f6e4abef4e
-
SSDEEP
12288:Y7qTUFuly20mB3EOIZ79QzM6flIHHFcJrJ2:OqaIyulnqQo6flIHHQrs
Score
1/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1164 chrome.exe 1732 chrome.exe 1732 chrome.exe 2240 taskmgr.exe 2240 taskmgr.exe 2240 taskmgr.exe 2240 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 1508 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1508 AUDIODG.EXE Token: 33 1508 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1508 AUDIODG.EXE Token: SeDebugPrivilege 2240 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2024 1732 chrome.exe 35 PID 1732 wrote to memory of 2024 1732 chrome.exe 35 PID 1732 wrote to memory of 2024 1732 chrome.exe 35 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1804 1732 chrome.exe 36 PID 1732 wrote to memory of 1164 1732 chrome.exe 37 PID 1732 wrote to memory of 1164 1732 chrome.exe 37 PID 1732 wrote to memory of 1164 1732 chrome.exe 37 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38 PID 1732 wrote to memory of 676 1732 chrome.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\KSP_x64.exe"C:\Users\Admin\AppData\Local\Temp\KSP_x64.exe"1⤵PID:1820
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1632
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x47c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1560
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef48d4f50,0x7fef48d4f60,0x7fef48d4f702⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1100 /prefetch:22⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1676 /prefetch:82⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1948 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2512 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3100 /prefetch:22⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3416 /prefetch:82⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3528 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3628 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1088,16218088436805042895,2839551069997957969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3728 /prefetch:82⤵PID:2124
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240