Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2023, 18:26

General

  • Target

    PayDay2 Level Hack 60/iphlpapi.dll

  • Size

    63KB

  • MD5

    ab7be16567d3325eaa760d4391df879a

  • SHA1

    1bf91ae442de3295143e8f4aa8cc44b4f0a558ec

  • SHA256

    f9ed851916d6cab9d9a993110823f03230c16176cc4e8447ad87769e7d3dc1f5

  • SHA512

    00186e551dba7b1191af92823b7dfbd6097b0888ecd586830b910494b08bcc4741f18f73efe17492cb20dde21744b5e44ab780bcae5eebd294748081b9769833

  • SSDEEP

    1536:vPO4LZMY0vU/NDhGOwart6NkwTuhWSlMYCXOtYJ2fmZJ:JLyvUlDEOw+YaUYWOtYJ/

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\PayDay2 Level Hack 60\iphlpapi.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\PayDay2 Level Hack 60\iphlpapi.dll",#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:280
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 280 -s 228
        3⤵
        • Program crash
        PID:1376
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c79758,0x7fef6c79768,0x7fef6c79778
      2⤵
        PID:1600
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:2
        2⤵
          PID:1532
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1460 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:8
          2⤵
            PID:1084
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1636 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:8
            2⤵
              PID:1780
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2224 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:1
              2⤵
                PID:1752
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2400 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:1
                2⤵
                  PID:1380
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1604 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:2
                  2⤵
                    PID:2096
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3656 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:1
                    2⤵
                      PID:2172
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3676 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:8
                      2⤵
                        PID:2200
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4028 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:8
                        2⤵
                          PID:2208
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3676 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:1
                          2⤵
                            PID:2400
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2424 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:1
                            2⤵
                              PID:2608
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2064 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:1
                              2⤵
                                PID:2860
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2108 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:1
                                2⤵
                                  PID:2936
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4780 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:8
                                  2⤵
                                    PID:2284
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5100 --field-trial-handle=1312,i,10595945648928602099,15479227815165787766,131072 /prefetch:1
                                    2⤵
                                      PID:2540
                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                    1⤵
                                      PID:1572
                                    • C:\Windows\system32\AUDIODG.EXE
                                      C:\Windows\system32\AUDIODG.EXE 0x484
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2388

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      62KB

                                      MD5

                                      3ac860860707baaf32469fa7cc7c0192

                                      SHA1

                                      c33c2acdaba0e6fa41fd2f00f186804722477639

                                      SHA256

                                      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

                                      SHA512

                                      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      344B

                                      MD5

                                      a36e1768a75091f52988f90ef234aeae

                                      SHA1

                                      d23df74aed69377f703ebea070ac5695a7393196

                                      SHA256

                                      e28b98079a8ebd1891e085013cd03a31b32b2474a6c414cfee72eaa590f1e3fb

                                      SHA512

                                      d18109bcc09ae1eb6a3834a9ee62cc21b2bc0a0b8f25dc8b4581333a33dc5006350281f61a13a70c51b9cd32721d8149eafcdbe69323049a768996510c7a5170

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      344B

                                      MD5

                                      de42024b63ac5bcbf37cdb1ebdc538ac

                                      SHA1

                                      75a126645b4dfc75dd565b142e8b353ed38251fa

                                      SHA256

                                      683dad70c6ce1f8e46e0d252313326cbec00a6655dc50d7ebd6f067014b2c55c

                                      SHA512

                                      adf0c99fd5e0735e28d5923b2dd4d615d6c8b13ad4f6741ecbc077a58e2dc1cb3a7393d9a2003103d5b803e2dc3e5abba27fd7c179f8c20d729fdd3432509907

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      344B

                                      MD5

                                      32baf13ee2db7958ca4b4cdf0efc1631

                                      SHA1

                                      c59c6444b3154863e7c1e7f875877f08294cd055

                                      SHA256

                                      1e6098e5a8dad9b14a3bd2d93b8229f8be8e511b74b404baec15b483ac868501

                                      SHA512

                                      795a138268963f95c68f5c1051db0d5ca9ded0b9e8cb1b4b8d44611bc54cde529c846e65c5289cf6e64c85d81972328610e7cbed32a1d7c09259eb14a46f4dfd

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      344B

                                      MD5

                                      18fa7adb2ccd92ae874ca86452481bf5

                                      SHA1

                                      4441c0e615470a046ce1e30d827f4155b8f47e3e

                                      SHA256

                                      146b8c5f60a045d3b39280645d0fd2842d0bedaef195373f4ac785827a882d34

                                      SHA512

                                      be9cb13694844a0491c6ab224422696eabd0e84a730deb79e118a32dc3cbed7ceee883c5c88456f0ddab53effbef187621f484da7668be9bf0786c589450b8fb

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      f50f89a0a91564d0b8a211f8921aa7de

                                      SHA1

                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                      SHA256

                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                      SHA512

                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.xnxx.com_0.indexeddb.leveldb\CURRENT~RF6ce8f9.TMP

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000004.dbtmp

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      363B

                                      MD5

                                      dd8500cb4778a9dc43b706fa99716e2a

                                      SHA1

                                      9b4032adae19e3e7e64703c2676184dd967c42ce

                                      SHA256

                                      f04c948f8843f7f5a170588ed85d8c3812a4d5688bac6d14a9f0aeebc2ce414d

                                      SHA512

                                      6ec8ec319ed0f38ec724edd756323a2485c255103511fdbdc043cfb1b31c9aa248de31f84d4d5f78ebe61b83712df8fc5ad4ceda8a098429692fed5d8b0eaca3

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      363B

                                      MD5

                                      569ab730b65761504882cb6fdd09df90

                                      SHA1

                                      c4ba774b26ad1e56508d07a3a4a30b344dcbc38e

                                      SHA256

                                      bbff9bea44426d113824e955d35e65c30b321525a2adce9a7da6ff2bb4ea5749

                                      SHA512

                                      a1e2faeb73fde4bdb3b9e6bf31f4cf541dfd26bde030482dc6f432a4dd63edcbf80cc8ef8cd6237215c36abe542c1b2a9d72b346b32ed0e7f8743e342ace1714

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      b6204caa0876feb5191a031462a4f82c

                                      SHA1

                                      6bb7b02942f21307094f94dd70bb66664a71e332

                                      SHA256

                                      a4b25cdc867434e747abefda0e634eaa05ad0185c059582cc757779c9f121b33

                                      SHA512

                                      e9194bcf6dd99fcc3914acccd4efdbb084abf6ea6960044b52d21cf9cccdbc4bf133e7e29bd9439a8bf879456b085a85202ead13c58788dac46afb4b832cd3b9

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      4KB

                                      MD5

                                      b9a71307364f67c4ee9ab85106e0b144

                                      SHA1

                                      b590fe67aefc3be412260b90dc944625eecd70bb

                                      SHA256

                                      382ace2a8f6d075c7a593b31cedf5d7a2028c813f58959bccd05ce478e0e4d58

                                      SHA512

                                      f158e9d12344fcbb454d8838aa9d69008e4b7ec754e38cf1cc15c18bbc3c3bc4f3e3846494fa79b5060d822994793ce5dd17b34497300299fa846abf9914a3f6

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      4KB

                                      MD5

                                      6f20c29329e691722e611838e036e24f

                                      SHA1

                                      87bf38ff9919320b848a8834ac1e3b29a2f5e701

                                      SHA256

                                      583865586abb4f75834080837e4250ca8e3c3c16c21277951b559d12086dcd34

                                      SHA512

                                      5914f37e2fafdde937ef718d691ae33a64c2d7fd2d68188215ebde9d2faf2bff2d8523f5b9d02c7029ddce6c13ecc076d82803e817da55ff4721760801e1fa59

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      4283667159e1e97ff3ce6e94027ac596

                                      SHA1

                                      5df0501df860e14c7d324482a39456cba2d32f28

                                      SHA256

                                      a7181d4fa7a55d527fc8d2062729169252fbf32e920d5438565c2ac7fa7a8eb7

                                      SHA512

                                      e94f4f2c7566f966d64be036cb1faff69971e9ecf6ec5d1a99216238bceca29ea2936a24cf609bd8199e88c246cec9172b6c5bca05360518f2ed818ee3559c9d

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      159KB

                                      MD5

                                      9395f95ff2226f9e4cf19716ccaad3b6

                                      SHA1

                                      d3d63536dcd03f47f44a7cc9d1a04565ec0049de

                                      SHA256

                                      5e8bbac161389f165ca15af4a00faedb81e518574fb80534b84473f11135cc18

                                      SHA512

                                      f21e3d30aef1d3aa191724b4d5e5aba5f12ffa4ad06a08ea704e522e9c3004fa63ac46bdd47298c3d2a927082892ab9ec03f6637f53b79d75230ac6f88616988

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\c9728c82-f117-4205-bc6f-fb7ec4a498d0.tmp

                                      Filesize

                                      159KB

                                      MD5

                                      4ff8ec9dec6660707d78f56948c2d463

                                      SHA1

                                      840363bd47093c649be89c231f4c6bcd30f688fc

                                      SHA256

                                      86ea79ae6d8c3a447d5bd94d724ecbeef53fb35e2a8a8aed80abcd4ebb5655c7

                                      SHA512

                                      0c462ea3ca32bce0c8680b37fa3708c83f5904a87e6b17017c4ab1caee14b73ed5b387c7cae914501dd9b06bc630e2b67224de9e6e248e9a6d734f5a8b4dc304

                                    • C:\Users\Admin\AppData\Local\Temp\TarE420.tmp

                                      Filesize

                                      164KB

                                      MD5

                                      4ff65ad929cd9a367680e0e5b1c08166

                                      SHA1

                                      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

                                      SHA256

                                      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

                                      SHA512

                                      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27