Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/06/2023, 17:56

230614-wh19macb9t 10

14/06/2023, 17:55

230614-whq4nacb28 7

14/06/2023, 17:15

230614-vsxthsbg45 10

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2023, 17:55

General

  • Target

    http://92.18.218.116

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://92.18.218.116
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a3da9758,0x7ff9a3da9768,0x7ff9a3da9778
      2⤵
        PID:4128
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:2
        2⤵
          PID:4712
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:8
          2⤵
            PID:4868
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:8
            2⤵
              PID:4372
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:1
              2⤵
                PID:3676
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:1
                2⤵
                  PID:3336
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:8
                  2⤵
                    PID:4884
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5232 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:8
                    2⤵
                      PID:2884
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5188 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:8
                      2⤵
                        PID:2720
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:8
                        2⤵
                          PID:4156
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:8
                          2⤵
                            PID:4524
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4848 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:8
                            2⤵
                              PID:3872
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4836 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:8
                              2⤵
                                PID:4872
                              • C:\Users\Admin\Downloads\LokiRAT_Relapse.exe
                                "C:\Users\Admin\Downloads\LokiRAT_Relapse.exe"
                                2⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                PID:4064
                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                  dw20.exe -x -s 1220
                                  3⤵
                                  • Drops file in Windows directory
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1276
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4476 --field-trial-handle=1816,i,18198959703800160627,13875365840159462493,131072 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3812
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:4452

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                bd572b6bc9dad323f67355a075842912

                                SHA1

                                1c4a8c8bd7bab6b0759c1d6391e8d5ace1bea5ba

                                SHA256

                                0fdbc0acbcb5085d5ee96663e80c41d1e4687d768ed6a68aaaa43844a2d19691

                                SHA512

                                9e474ebaea121b2440f2b9402da7f372dc5e2e1f69a957d5dd0493fbf8778584ec264f33a55a791618a2fd71bc505e64a29372e63072fe4ab5dd93ddb2f44166

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                59b7728e5972a40a4a7db24112864999

                                SHA1

                                2378db4d424f3b59899f32d5f724dd229b3a2708

                                SHA256

                                033dfe712da8987dd2b5a4e64183beccc6557815bc9c8aa84eca78f2ca269258

                                SHA512

                                410bc11bee3c3b10e9e49246e976ffd90de040d86c02ad9e553194119003f18b95598c03cbf5745015e385270535672b7b4e8b8427494d5a0d1bc854004e2a95

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                3a855e3e10e7a3584a969e72275fc2cb

                                SHA1

                                fed3dd96b83946dd99ffbc5a5a922046bcc1ef5e

                                SHA256

                                6e883925b220b3e27ea25d7ab0902e9c56eb187248724614b8bfbf20a56984a1

                                SHA512

                                77725ec6c5f677fb06a7a9d6c8a119999e45269bce65bfc845745f685dab7203a272b909131557587675b3689df254495d0719d8e2de7fd2497c0626c6fd652e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                03bbf1ecba785332573169f6279b944e

                                SHA1

                                ade452f888a4010d61a97d9accb416176d9bfd73

                                SHA256

                                7eaa8644ac605e19027f2c61001c7a61a32e56daa040a9f829049c4122e3c4c0

                                SHA512

                                eb1767ee13aa344c220a3cc8e9134b5dfa5c1d07dccbafae0451632199a233d5d847bbe7bde05460e85b8ba94be5f1e4dd9b87275828bceacccf9c070ef0255e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                159KB

                                MD5

                                58f45d70972e35280f1e4c35f4ba6f9b

                                SHA1

                                36809e44ccf0284ee16966d53bbc7aac59e55bcf

                                SHA256

                                33d03a09006ee22cb409646ca369d943450e9bccfd6c8bfd7732e207c16679ac

                                SHA512

                                cd94ae8593c1ec0db660e652af8e26840daa49a975b86036afab9fbe5acceda8e93882d8e62d4c10126307ac869eda58e4fc391ce9ecfa588db60b4836383330

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • C:\Users\Admin\AppData\Local\Temp\cbfcd52f-1b97-4146-a66d-c6959bc65b2b\CliSecureRT.dll

                                Filesize

                                109KB

                                MD5

                                46092bbddb5bdf775f67a341d2b03ad7

                                SHA1

                                5645a2b182986d0278c862390014e20cc501d996

                                SHA256

                                a9f6783f2864f4532db011c8fccb41fa3732148a810084c7efa8dddbd5ae6324

                                SHA512

                                5b6cdae42a17aad74500a0ec7c1c4c6d6f0a2a28a43e6620eb26bbf2fe0e0f6adf1836317a33e0e720c70909405c74b3e95df1cb7011732a97f723edb5d250d5

                              • C:\Users\Admin\AppData\Local\Temp\cbfcd52f-1b97-4146-a66d-c6959bc65b2b\CliSecureRT.dll

                                Filesize

                                109KB

                                MD5

                                46092bbddb5bdf775f67a341d2b03ad7

                                SHA1

                                5645a2b182986d0278c862390014e20cc501d996

                                SHA256

                                a9f6783f2864f4532db011c8fccb41fa3732148a810084c7efa8dddbd5ae6324

                                SHA512

                                5b6cdae42a17aad74500a0ec7c1c4c6d6f0a2a28a43e6620eb26bbf2fe0e0f6adf1836317a33e0e720c70909405c74b3e95df1cb7011732a97f723edb5d250d5

                              • C:\Users\Admin\Downloads\LokiRAT_Relapse.exe

                                Filesize

                                1.1MB

                                MD5

                                aabb54951546132e70a8e9f02bf8b5ba

                                SHA1

                                29df820f6a1ba8225ecb5628b6f3d1ec71bc3cdd

                                SHA256

                                1cc4fab54263dfa842c80a72b78a9c223894264b9b4f25263d8fdc2f69def8a1

                                SHA512

                                5049fe5833af239207d4c7b8cca5715b4c363a372b39b76450dd1ef866e5a83201646ab6e97bcca9e4be7cf2461096b45777d29d645920b8f367d8d5e66422dd

                              • C:\Users\Admin\Downloads\LokiRAT_Relapse.exe

                                Filesize

                                1.1MB

                                MD5

                                aabb54951546132e70a8e9f02bf8b5ba

                                SHA1

                                29df820f6a1ba8225ecb5628b6f3d1ec71bc3cdd

                                SHA256

                                1cc4fab54263dfa842c80a72b78a9c223894264b9b4f25263d8fdc2f69def8a1

                                SHA512

                                5049fe5833af239207d4c7b8cca5715b4c363a372b39b76450dd1ef866e5a83201646ab6e97bcca9e4be7cf2461096b45777d29d645920b8f367d8d5e66422dd

                              • C:\Users\Admin\Downloads\Unconfirmed 197206.crdownload

                                Filesize

                                1.1MB

                                MD5

                                aabb54951546132e70a8e9f02bf8b5ba

                                SHA1

                                29df820f6a1ba8225ecb5628b6f3d1ec71bc3cdd

                                SHA256

                                1cc4fab54263dfa842c80a72b78a9c223894264b9b4f25263d8fdc2f69def8a1

                                SHA512

                                5049fe5833af239207d4c7b8cca5715b4c363a372b39b76450dd1ef866e5a83201646ab6e97bcca9e4be7cf2461096b45777d29d645920b8f367d8d5e66422dd

                              • memory/4064-194-0x0000000073190000-0x00000000731EB000-memory.dmp

                                Filesize

                                364KB

                              • memory/4064-197-0x0000000010000000-0x000000001002C000-memory.dmp

                                Filesize

                                176KB

                              • memory/4064-205-0x00000000006B0000-0x0000000000AF2000-memory.dmp

                                Filesize

                                4.3MB

                              • memory/4064-196-0x0000000004C00000-0x0000000004C10000-memory.dmp

                                Filesize

                                64KB

                              • memory/4064-195-0x0000000002FC0000-0x0000000002FC1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4064-186-0x00000000006B0000-0x0000000000AF2000-memory.dmp

                                Filesize

                                4.3MB