Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
328s -
max time network
346s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12/01/2023, 15:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/ZuB3BI4T#JljzS4mrB7Xi2S3O8mBsiFCfvUWwgsYGMW0yZBZtdQA
Resource
win7-20221111-en
6 signatures
1800 seconds
Behavioral task
behavioral2
Sample
https://mega.nz/file/ZuB3BI4T#JljzS4mrB7Xi2S3O8mBsiFCfvUWwgsYGMW0yZBZtdQA
Resource
win10v2004-20220812-en
10 signatures
1800 seconds
General
-
Target
https://mega.nz/file/ZuB3BI4T#JljzS4mrB7Xi2S3O8mBsiFCfvUWwgsYGMW0yZBZtdQA
Score
1/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 280 chrome.exe 964 chrome.exe 964 chrome.exe 2280 chrome.exe 2344 chrome.exe 964 chrome.exe 964 chrome.exe 2776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2076 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2076 AUDIODG.EXE Token: 33 2076 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2076 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 1420 964 chrome.exe 28 PID 964 wrote to memory of 1420 964 chrome.exe 28 PID 964 wrote to memory of 1420 964 chrome.exe 28 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 772 964 chrome.exe 29 PID 964 wrote to memory of 280 964 chrome.exe 30 PID 964 wrote to memory of 280 964 chrome.exe 30 PID 964 wrote to memory of 280 964 chrome.exe 30 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31 PID 964 wrote to memory of 584 964 chrome.exe 31
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://mega.nz/file/ZuB3BI4T#JljzS4mrB7Xi2S3O8mBsiFCfvUWwgsYGMW0yZBZtdQA1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f04f50,0x7fef6f04f60,0x7fef6f04f702⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1132 /prefetch:22⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1756 /prefetch:82⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2080 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3308 /prefetch:22⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3708 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1448 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1684 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=692 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3248 /prefetch:82⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3240 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3292 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1124,15114892418022643986,3551387136503021256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2101⤵
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:3036
-
C:\Windows\system32\java.exejava -jar Crash.jar 149.56.78.195 25565 1500 1200 1 152⤵PID:2108
-
-
C:\Windows\system32\java.exejava -jar Crash.jar 149.56.78.195 25565 1500 1200 1 152⤵PID:588
-