Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

06/03/2023, 05:14

230306-fxgwjaac7w 10

06/03/2023, 05:07

230306-fr3aaaag68 10

06/03/2023, 05:01

230306-fnq3vaag64 10

Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2023, 05:01

General

  • Target

    https://www.dhlindia-kyc.com

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.dhlindia-kyc.com
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffd44349758,0x7ffd44349768,0x7ffd44349778
      2⤵
        PID:4692
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:2
        2⤵
          PID:232
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:8
          2⤵
            PID:4172
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:8
            2⤵
              PID:4732
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:1
              2⤵
                PID:3552
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:1
                2⤵
                  PID:4700
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4812 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:1
                  2⤵
                    PID:4584
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5152 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:8
                    2⤵
                      PID:4640
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:8
                      2⤵
                        PID:3476
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4624 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:8
                        2⤵
                          PID:3768
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:8
                          2⤵
                            PID:2968
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:8
                            2⤵
                              PID:3404
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2768 --field-trial-handle=1832,i,12164638488279082398,8889945582991255486,131072 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4868
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:2072

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              120B

                              MD5

                              752f08bfcb0a0edb036af60bff3b8c80

                              SHA1

                              9cec4a1d914aa4e2730c99a1a37f5f6a03d2695a

                              SHA256

                              8be7f5b9051a27710e50d9668d461b5b4d1ee9237e12c2743b073490054d2e05

                              SHA512

                              83dda83835ebb073b9ffb5b1a8e7f7a695e11574aecce1e9891d06a3f58d6ddbe1f70bed69a7c9ff692d2a6c1368e4babb3cd368b7b2265beacd5c5e89eb3bc1

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              0953ef2971b4f7e8814f4f9a2b890537

                              SHA1

                              213485c45928a9c9312a3ddab11239073632a1f0

                              SHA256

                              c3242e8ae28801c6a44a56283d583761b7dbd955facb0a54e33f3c5e3b275602

                              SHA512

                              7fc888e7ad07ba89a2765c933afcb33826bce310d0aa72b9206df9496f04808ce594f81688acffbcc358fcc3710e676f5d7cc970e6a74699e63b83f7715202fa

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              cdeab233ceba7bffb644b0f9a34821c8

                              SHA1

                              fe49e1cadbfca6f5226e2f49230d20af2f0bc87d

                              SHA256

                              2a6220c98fa2a37ce8685e44d3f0dce2e6443287b8fd58cd6e757f5fa171c90f

                              SHA512

                              fbc9ef328c34175a1e603e0e4bec7d9ca42a1eda684a551fae9b8219c84a1df0d7286b094e200d01f3de8774ae38af24bda2ff5ea92b4f8ff6e0c5aa02806e71

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              1f3523c643bb2cee9f9e1d47b817db8f

                              SHA1

                              5688ea7a24a332621f760ea5c41ea9cacd50ed18

                              SHA256

                              d1e3e282b528d720badfd8ff10c539ae0d01ea16161f27a8407180eca6147f64

                              SHA512

                              abe5b786bb15e8762abc4bcae6f96598fb0f3f15a43adfe859c1955a6c58533a8a991c17635c74336b8e7d6d27911ae7e8a5e327ab2239f8d4e6e6f00f8dac4b

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              538B

                              MD5

                              7d853d587f7485d3d21d95a9abaed65b

                              SHA1

                              356fce4e38029438eb6c3aa3a24764c972e039c8

                              SHA256

                              6417d094345a131dd52dd9fec91ab577196508793e6684e51f935bab4c89031f

                              SHA512

                              b9e87896fe4680be8d437836fb762ba78eaf7b186f814589b13e86e3a576f838d54db97cc294a0e198247e969a7e713ae855c746cc41a3534ce807010fefacbf

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              64134310f25989aa70771abf5dbd6540

                              SHA1

                              b1d256fbb4b8ca23e24c0e68c140611c6fd55de5

                              SHA256

                              1cfd3c2005612d0a468d219063756762ec9a0232c135a8a0787ce041ef5dae7f

                              SHA512

                              124cfeaa5defe7eefe13176013a5c6cc5f6f24f2911e00efab53d9f43a76862469846ec60640bf4621330b9c1d7d76b8b4d659af0d6b8af6a8927730e19e5b98

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              d463dcaca7ce6397196fb8a52457c28f

                              SHA1

                              8539809708069920e92fd588ea0ed0de03ee2bd3

                              SHA256

                              6512154dbbc3e5baa49870bc7987d3a5c703d1f8a1c5ce9ba8b5a9ef3998146b

                              SHA512

                              37fbe1e156e8d8d1d171ac6bde4c407a5e700409d8fc6db308890c66b5f1a56817b4aed2a3663ae10036890c2874a7d4a73a3500087759a54d0d3d7dc8cbba7f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              144KB

                              MD5

                              525eeb3a95a0c7082b3a3847cacecbbc

                              SHA1

                              903e11b664beb5ebb256c5670c0da7f839f39774

                              SHA256

                              ef4a7a9aba4743e5be87e399c0bdb0334536fe7f0a47231e2cfc648d9747e11b

                              SHA512

                              b1420b6c5da97532627751c305096c5986f9ab2ee84389d267702169868eff3f523a9788c740a0739d8eb161e27a99c169b2d7e2a741dfa620cd7b2a46fadc44

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              72KB

                              MD5

                              d64e12b28219ec6ab02e30ef45073702

                              SHA1

                              0bb2eab56e186e534f3dbea1c5220cd1f4602ddc

                              SHA256

                              f7d15489a3134f791b0e61264c0acf1f35423e2c78681451687c2a5b08ca33a5

                              SHA512

                              ce96dcb48db90a9530d80754145b357500a8effe407bb7d306deacf5676ed28f4bf29d01359cf075164718c1f38c4b6dcc4dd958659f95b55ea75982e11e0ba4

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              144KB

                              MD5

                              c1464dfa98ad4e033ef3d0d146ab4c5e

                              SHA1

                              049f6cba88decc2a15310947211ca94126badd8f

                              SHA256

                              35e706c16d947e3a55804aaeddbff9c69c5fb198b81d4f95203531b4083057bb

                              SHA512

                              a179938308c9049faab9ea5de0b387df825306c078eaa1ef4efc1203212cb128f72b465e90d230c5227c83f15e92042f56fabddaaa2e9b482c04db7425ce94d7

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                            • memory/232-141-0x00007FFD60140000-0x00007FFD60141000-memory.dmp

                              Filesize

                              4KB

                            • memory/4640-181-0x00007FFD610B0000-0x00007FFD610B1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4640-180-0x00007FFD61350000-0x00007FFD61351000-memory.dmp

                              Filesize

                              4KB

                            • memory/4868-279-0x00000134C5810000-0x00000134C5811000-memory.dmp

                              Filesize

                              4KB

                            • memory/4868-280-0x00000134C5810000-0x00000134C5811000-memory.dmp

                              Filesize

                              4KB

                            • memory/4868-286-0x00000134C5810000-0x00000134C5811000-memory.dmp

                              Filesize

                              4KB

                            • memory/4868-285-0x00000134C5810000-0x00000134C5811000-memory.dmp

                              Filesize

                              4KB

                            • memory/4868-290-0x00000134C5810000-0x00000134C5811000-memory.dmp

                              Filesize

                              4KB

                            • memory/4868-289-0x00000134C5810000-0x00000134C5811000-memory.dmp

                              Filesize

                              4KB

                            • memory/4868-288-0x00000134C5810000-0x00000134C5811000-memory.dmp

                              Filesize

                              4KB

                            • memory/4868-287-0x00000134C5810000-0x00000134C5811000-memory.dmp

                              Filesize

                              4KB

                            • memory/4868-291-0x00000134C5810000-0x00000134C5811000-memory.dmp

                              Filesize

                              4KB

                            • memory/4868-281-0x00000134C5810000-0x00000134C5811000-memory.dmp

                              Filesize

                              4KB