Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/06/2023, 07:11

230602-h1bvssac99 6

02/06/2023, 07:02

230602-ht5jjaag4s 6

02/06/2023, 06:41

230602-hf5mdaaf8w 6

Analysis

  • max time kernel
    1797s
  • max time network
    1590s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2023, 07:11

General

  • Target

    https://yandex.ru/

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 11 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://yandex.ru/
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc47249758,0x7ffc47249768,0x7ffc47249778
      2⤵
        PID:5068
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1764,i,17123769802707994216,2153754696768258158,131072 /prefetch:2
        2⤵
          PID:3504
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1764,i,17123769802707994216,2153754696768258158,131072 /prefetch:8
          2⤵
            PID:4220
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1308 --field-trial-handle=1764,i,17123769802707994216,2153754696768258158,131072 /prefetch:8
            2⤵
              PID:2904
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3216 --field-trial-handle=1764,i,17123769802707994216,2153754696768258158,131072 /prefetch:1
              2⤵
                PID:3380
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3228 --field-trial-handle=1764,i,17123769802707994216,2153754696768258158,131072 /prefetch:1
                2⤵
                  PID:448
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4548 --field-trial-handle=1764,i,17123769802707994216,2153754696768258158,131072 /prefetch:1
                  2⤵
                    PID:760
                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                  1⤵
                    PID:4092
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    PID:1404
                    • C:\Windows\system32\sdclt.exe
                      "C:\Windows\system32\sdclt.exe"
                      2⤵
                        PID:2096
                        • C:\Windows\System32\control.exe
                          "C:\Windows\System32\control.exe" /name Microsoft.BackupAndRestoreCenter
                          3⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1116
                      • C:\Windows\system32\sdclt.exe
                        "C:\Windows\system32\sdclt.exe" /BLBBACKUPWIZARD
                        2⤵
                        • Enumerates connected drives
                        • Checks SCSI registry key(s)
                        PID:2504
                    • C:\Windows\SysWOW64\DllHost.exe
                      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                      1⤵
                        PID:512
                      • C:\Windows\SysWOW64\DllHost.exe
                        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                        1⤵
                          PID:1440
                        • C:\Windows\system32\wbengine.exe
                          "C:\Windows\system32\wbengine.exe"
                          1⤵
                          • Checks SCSI registry key(s)
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3192
                        • C:\Windows\System32\vdsldr.exe
                          C:\Windows\System32\vdsldr.exe -Embedding
                          1⤵
                            PID:5084
                          • C:\Windows\System32\vds.exe
                            C:\Windows\System32\vds.exe
                            1⤵
                            • Checks SCSI registry key(s)
                            PID:4832
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Checks SCSI registry key(s)
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4804
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k SDRSVC
                            1⤵
                              PID:3144

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\87a42b75-1bb9-41d4-9146-90a25ca0a47f.tmp

                              Filesize

                              15KB

                              MD5

                              7db5273bc75cfa882cd24714f458bca3

                              SHA1

                              66cf19bc7ff16b3089fe2afbf45e1b6d11b5ba90

                              SHA256

                              ad4dd7a62cfe5c2f6f2e084f64c0a584b9e3e7b80db0e6b7cf4fab0853698bbc

                              SHA512

                              ce69aae811f9c8f371543b5c1ee3fe922fb393a1975ed5822850eeb19fb567cd4f7fe21df0403dfcd0dddaf978369c27c8a824000eefcd4cfb8644ed8d7498b8

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              408B

                              MD5

                              bb5b80acb7a2a3d34fad7a2037eb788f

                              SHA1

                              c7feac30f57afb86bff02853acd43328e628feae

                              SHA256

                              fbaa736b3e09e88b2d6b6668b5d4afbaeed388519b06fc1473da4251e3ba7d7c

                              SHA512

                              c744343be561b53fe3852f31cd49c2337a3ffe0e5afe1e908fc22c8501651a11545f5dfe537f0807e99fb470896c5f03b184d8cfc8fc5f2bfeab54cde5d94b6f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\001\t\Paths\MANIFEST-000001

                              Filesize

                              41B

                              MD5

                              5af87dfd673ba2115e2fcf5cfdb727ab

                              SHA1

                              d5b5bbf396dc291274584ef71f444f420b6056f1

                              SHA256

                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                              SHA512

                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              3f89de84064e41b118f27791f219085b

                              SHA1

                              1e7aa0e86414afced52bccafc4eaca6070bf4be0

                              SHA256

                              77ca7cfbe7b5b0363634de1c31b4a68f1611bf6f7ebd0ac3ac46ac479f091afc

                              SHA512

                              f7ce1838a0fbc12f8dcdb92d64daae4d04b895ec6b85d111282ad4632cc486f789b07605d6305bd9c47a503b4e19cdccf37c884e178a1e7820375525367878d9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              878a0d41b6ee554f304c9d4d3d9ee0a2

                              SHA1

                              0991e82a3e071e18a0194485c46240e45237332a

                              SHA256

                              3e95e33d9d20d5f5542326be5a068ca0008724d4e1402310fd17760526c53863

                              SHA512

                              8fe0dd2c18df196d6c29035f8ad17a43339cfe4c249c6c9f32c06821c6392d322c66b57de45ed4d2b6feedb91cc47af87ce1985c7e9daaed1a0171326c07f936

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              7KB

                              MD5

                              46f0bcea49725e6597c3b00bcd6cdc56

                              SHA1

                              0ad0496ce8b54e644d689f6ddc2278759bc438d5

                              SHA256

                              556fc8c2f754f39430fa3cbd477edb615ee4f2ca8824b49d19836fe722d5ab05

                              SHA512

                              b7621b64d27a52440a142228eb4376b77b84364fb605de309717ff1cd0a2dee8d8be1ac4a1f10bc8a3d9d0b935a0ea2fad89f4b970e022741652d0ecfb1af60f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              158KB

                              MD5

                              24e2c45bda150f09bb5a8726349716c3

                              SHA1

                              65a4cb5247f0d5916210f056624a76769b075b3a

                              SHA256

                              7e4b78d32e82fd66fe35e09e5f597871e540fa5fc239003708eb26fbcefc368b

                              SHA512

                              e22cefbdce46f8b0f06df085b67017799d040fe6dd2cb0355c0b3af6a4fed266d2ee26d8f41aa8dcab0dee2e0c1211d0f5dfd0ba69e8511c89edbc72e1e8e2ab

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              158KB

                              MD5

                              5f7f082866301e1125408077f30b8751

                              SHA1

                              13809a373974dd9fea628905c0206b20dde7d530

                              SHA256

                              e31d64f3170e602c54b910af2aa6b283886a23a8388ec43814c2f235d34d0b62

                              SHA512

                              476961cbe6eef68f967ba1d51ab2c02d30c09c7ae678bb29305d66c55c4b48d7de4e43c02c1016677a0a1472329d103fff53b8828d60029e58ad5bc39adb11fd

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                              Filesize

                              28KB

                              MD5

                              a010b147fbd630f8cff11439302659bb

                              SHA1

                              527013c2018c785f74866f2402fcc49c1ae17c7f

                              SHA256

                              dd6fa45f29f612ec2b78a4f3b9c26c4f63d555ec96eba574ef446e685883d376

                              SHA512

                              43bdc8c21bb3b434e06e2568a822a3904c074da4afb9196f9fb2dbea55d689c8c95201bbcee27489c1814a65c90a63c537c345fa7a14313fe7f5df10ef86a659