Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/04/2023, 18:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1016085640980475976/1096136827435495564/WhatsApp_Chat_-_Dkfokglflf.zip
Resource
win7-20230220-en
General
-
Target
https://cdn.discordapp.com/attachments/1016085640980475976/1096136827435495564/WhatsApp_Chat_-_Dkfokglflf.zip
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: 33 2784 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2784 AUDIODG.EXE Token: 33 2784 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2784 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1996 2012 chrome.exe 27 PID 2012 wrote to memory of 1996 2012 chrome.exe 27 PID 2012 wrote to memory of 1996 2012 chrome.exe 27 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1752 2012 chrome.exe 29 PID 2012 wrote to memory of 1020 2012 chrome.exe 30 PID 2012 wrote to memory of 1020 2012 chrome.exe 30 PID 2012 wrote to memory of 1020 2012 chrome.exe 30 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 PID 2012 wrote to memory of 900 2012 chrome.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://cdn.discordapp.com/attachments/1016085640980475976/1096136827435495564/WhatsApp_Chat_-_Dkfokglflf.zip1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefad09758,0x7fefad09768,0x7fefad097782⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1300,i,17246197429288611350,1852194677821859470,131072 /prefetch:22⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1300,i,17246197429288611350,1852194677821859470,131072 /prefetch:82⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1300,i,17246197429288611350,1852194677821859470,131072 /prefetch:82⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2208 --field-trial-handle=1300,i,17246197429288611350,1852194677821859470,131072 /prefetch:12⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2192 --field-trial-handle=1300,i,17246197429288611350,1852194677821859470,131072 /prefetch:12⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3632 --field-trial-handle=1300,i,17246197429288611350,1852194677821859470,131072 /prefetch:82⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1504 --field-trial-handle=1300,i,17246197429288611350,1852194677821859470,131072 /prefetch:22⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1696
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_WhatsApp_Chat_-_Dkfokglflf.zip\_chat.txt1⤵PID:2704
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1741⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
4KB
MD57f8b71378f0c6164c93c9b4548ba7817
SHA16da1a9fc6d0e02c0218ef9a16ec438e9d9ece09f
SHA256c08981178761bc73d4f435f0df584d38499ea26132f3464bc2fe1d5d1dd26048
SHA512b236d237607e947c6cd77ec4935f6a60f16352dbad9d1e88bdd4432d83ae6968a48e5258cc59b9ce79198c9803790a6228d4ce49c91d09170bfefe83d126da84
-
Filesize
199KB
MD5695f810b00434188fa21bf5f06119924
SHA18ee17c67e16f50a07158787a640e7eeb111c9f4f
SHA256a04686cb031f6a12fc59523ec25c566c7662776792ce33af6176a0ad8c7ad26f
SHA5125fd14b42ae50cf8713f8e81a2bc95b0adf912d873f4909cafa8f8c0a2d5ec0b46f78908eed211ccb703a915035b2abda547d478cac3a17726c55c0f165c3de94
-
Filesize
199KB
MD50d45347c7f0e7c2bd13fccf71b7c5716
SHA1985f59ad53475969155a4d1d58af300b65794c9e
SHA25627f78120c9e808c218a4033dd422964d2546d8b487d60b38fd4c7edd176a3052
SHA512a75cc16d0fc8b080907570f2b00cb867d1b30d1fc592b44a84bafe174f5f05047d1fbac42ae1012887da535240b4c9b21296c9e96198c8ab88c60b3c5d7b27a5