Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    31s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2023, 14:05

General

  • Target

    Vision Spoofer.exe

  • Size

    13.9MB

  • MD5

    0b3056ff82502af74f12ac17eea25785

  • SHA1

    8468a2cc845ea00c60538a3bd95e6d833eaf0035

  • SHA256

    00f62ef8e8b23bdb35edb8cf19c5de05204e3b4533ec3fad2d92c590e4217a2d

  • SHA512

    09c6916f58486a76a17c623e7df84ffcaab70ecc69888ee8627be7a0b959fddff640f38ea1efb9d8b9e6a32668f2573095a136c4d486683213d7c39808da3944

  • SSDEEP

    196608:Jd/lOqPnih8FXj+hYeB0sKYu/PaQgKDnO8NpHzgsAGKaRZtG7ETPtqlKpVd00mVi:MqPnLFCjQpDOETgsv/GIZ6KV01gk

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vision Spoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\Vision Spoofer.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\Vision Spoofer.exe
      "C:\Users\Admin\AppData\Local\Temp\Vision Spoofer.exe"
      2⤵
      • Loads dropped DLL
      PID:676
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:680
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66a9758,0x7fef66a9768,0x7fef66a9778
      2⤵
        PID:1328
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1236 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:2
        2⤵
          PID:1700
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:8
          2⤵
            PID:1928
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1672 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:8
            2⤵
              PID:1932
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2268 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:1
              2⤵
                PID:968
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2212 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:1
                2⤵
                  PID:472
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1236 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:2
                  2⤵
                    PID:2068
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3676 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:1
                    2⤵
                      PID:2176
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3856 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:8
                      2⤵
                        PID:2212
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3844 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:8
                        2⤵
                          PID:2204
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4192 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:1
                          2⤵
                            PID:2372
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2748 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:1
                            2⤵
                              PID:2576
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2292 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:1
                              2⤵
                                PID:2960
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4656 --field-trial-handle=1256,i,7170888241573052644,3566340963991598187,131072 /prefetch:1
                                2⤵
                                  PID:3044
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:1984

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  62KB

                                  MD5

                                  3ac860860707baaf32469fa7cc7c0192

                                  SHA1

                                  c33c2acdaba0e6fa41fd2f00f186804722477639

                                  SHA256

                                  d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

                                  SHA512

                                  d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  df6e09a7234c524a3eead326702203ee

                                  SHA1

                                  27e3b599e66ba350bb2a3d3728f6c5dc9f2d3917

                                  SHA256

                                  a81d41c00d89fde71818f3c33cedb37a115255d3869af328bc29da5c6cb4c39c

                                  SHA512

                                  f8d920888dcc18f4cf7ba6968ea3ebb43d69eb6130a929d7c375b78a2fbd7a7d48bbb821a4b41dd0a771d6bdb8851b106ed87ae703795179f95fdb25cff33a06

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  363B

                                  MD5

                                  357f6ffbf11f7e9fc9d7532e82f42a02

                                  SHA1

                                  6b67364acb515e9ed3e80c9904ac8ee7750ae567

                                  SHA256

                                  71f8929c5eaa27298d73b8cef8ede3e133b84996f3e428adb5aea3170b3cc107

                                  SHA512

                                  8b3ef794bcd60d6c4cafc38aa206782f1b018a528836e328b07857914855ec2ca5dcce348c1da6678ece76f1a8687669d6ac504b4cf7abd411efeb6233840b82

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  363B

                                  MD5

                                  e93f7e5d075215da8ed567ccc258f208

                                  SHA1

                                  24d87ae484a4a05c965be933fb48590f1a519eaa

                                  SHA256

                                  77d9a274f5a93698fb0071d7961e4f6c21d317a103b0f26a34c01bae23ea4795

                                  SHA512

                                  dffe1f0ae9c8660f67949fc5cd1f789efaf249e0c3e1b79bf3cd4814946d6bdad0da4d0a699783050e071fa6ae03c08918c2e952dc90ed9011f55b4e7bb8082b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  1KB

                                  MD5

                                  d9503fb0fa24c7948c404638e7216f98

                                  SHA1

                                  ccac46c0050fd165ea800ae5aaabec7ff194f410

                                  SHA256

                                  b66940c825c8c0676c8ffadc87d9dee36a72c1179ed9e2fe58c7dd2162bfb8fe

                                  SHA512

                                  740bfdcf5a38c7c9d84638fd018c64c38429bf77f7d31de65682e61d154dce5468f563917202c8383ec3bb8d1c0b167a73c6c5fc7c67b84dee5c416147fbb31d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  4KB

                                  MD5

                                  32f6bd0241627a3d205f2a122f1287f8

                                  SHA1

                                  751067b3f400a608abef992be08bed2941a17e46

                                  SHA256

                                  8a2a7748a789c548f9e9640fa6f8000d3bf473ae9d581f5b8f4cf5ccf9ea6411

                                  SHA512

                                  41992065792085963b95a005f6534b439723df015274fa43f5963f0c34d9f0980b53985df20a16ec45f25a4f2426ff8629905dc17edf129310d175b852461dc8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  0307f9682c310719d7f99c748bdd01a4

                                  SHA1

                                  22cc877b514e026456b704850543ed890ed5b4ea

                                  SHA256

                                  edf86dec089ac895ac4669073a683a9099e9b79b0b616714d9d880375874df97

                                  SHA512

                                  c0cfdd21264b1b1d1de1515b2ca2fca2fcd27b89644b6356260f3199515b0dada782f23c8dd10567f503c2308ca72669b2846a6adf2918ef5444b598a73bb63b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  4KB

                                  MD5

                                  a89e8ff5b5475b6d4a123f0720a8ebf5

                                  SHA1

                                  ddffb615a3d3342854c2da48898b5e79a6cbc2e1

                                  SHA256

                                  622b6b5f4437cd37f5f3b6925050cdfe01bb3595aabb94f2ba1376a88de0c0ff

                                  SHA512

                                  df9fd0966d48b86002916fc5d33422cc0ae1f109ccc150c82154e466f02d220e72b322895c79d3b13ec71f713395a00c12cbefdc6deffe3a8ea112ce57d33efb

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000004.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Temp\Tar9027.tmp

                                  Filesize

                                  164KB

                                  MD5

                                  4ff65ad929cd9a367680e0e5b1c08166

                                  SHA1

                                  c0af0d4396bd1f15c45f39d3b849ba444233b3a2

                                  SHA256

                                  c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

                                  SHA512

                                  f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

                                • C:\Users\Admin\AppData\Local\Temp\_MEI20322\python310.dll

                                  Filesize

                                  1.4MB

                                  MD5

                                  69d4f13fbaeee9b551c2d9a4a94d4458

                                  SHA1

                                  69540d8dfc0ee299a7ff6585018c7db0662aa629

                                  SHA256

                                  801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046

                                  SHA512

                                  8e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378

                                • \Users\Admin\AppData\Local\Temp\_MEI20322\python310.dll

                                  Filesize

                                  1.4MB

                                  MD5

                                  69d4f13fbaeee9b551c2d9a4a94d4458

                                  SHA1

                                  69540d8dfc0ee299a7ff6585018c7db0662aa629

                                  SHA256

                                  801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046

                                  SHA512

                                  8e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378

                                • memory/676-151-0x000007FEF5B30000-0x000007FEF5F9E000-memory.dmp

                                  Filesize

                                  4.4MB