Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
49s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2023, 21:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/fabrimagic72/malware-samples/raw/master/Ransomware/Wannacry/697158bcade7373ccc9e52ea1171d780988fc845d2b696898654e18954578920.zip
Resource
win10v2004-20230621-en
General
-
Target
https://github.com/fabrimagic72/malware-samples/raw/master/Ransomware/Wannacry/697158bcade7373ccc9e52ea1171d780988fc845d2b696898654e18954578920.zip
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133327221913461342" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeRestorePrivilege 4952 7zG.exe Token: 35 4952 7zG.exe Token: SeSecurityPrivilege 4952 7zG.exe Token: SeSecurityPrivilege 4952 7zG.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4952 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4812 4276 chrome.exe 84 PID 4276 wrote to memory of 4812 4276 chrome.exe 84 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 1268 4276 chrome.exe 85 PID 4276 wrote to memory of 3332 4276 chrome.exe 86 PID 4276 wrote to memory of 3332 4276 chrome.exe 86 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87 PID 4276 wrote to memory of 3040 4276 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://github.com/fabrimagic72/malware-samples/raw/master/Ransomware/Wannacry/697158bcade7373ccc9e52ea1171d780988fc845d2b696898654e18954578920.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa304d9758,0x7ffa304d9768,0x7ffa304d97782⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1820,i,9396776171343982245,3348008644284735985,131072 /prefetch:22⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1820,i,9396776171343982245,3348008644284735985,131072 /prefetch:82⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1820,i,9396776171343982245,3348008644284735985,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3124 --field-trial-handle=1820,i,9396776171343982245,3348008644284735985,131072 /prefetch:12⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3132 --field-trial-handle=1820,i,9396776171343982245,3348008644284735985,131072 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1820,i,9396776171343982245,3348008644284735985,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4904 --field-trial-handle=1820,i,9396776171343982245,3348008644284735985,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 --field-trial-handle=1820,i,9396776171343982245,3348008644284735985,131072 /prefetch:82⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1820,i,9396776171343982245,3348008644284735985,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3108
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2684
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap32144:190:7zEvent264301⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702B
MD5d4d4bef901c1ed0005ab79f046fa0fb8
SHA13c91263e82e1ba2be7a78ca92295ebb0b0e96a56
SHA25636342391c314481c4754b4196c3200732571542961f41cf3316ec1d1e54c46a9
SHA51276d931a7594bfe66dfb80e4becb75775e99c9c4ed13e8de259a9c4be732fa3606075dc0c7b431eff99410c095736578970c5f87038d8997732405cfff71e4319
-
Filesize
6KB
MD5a4ea974d75a99e59c22e105295c9af8c
SHA1c99e827271b1fe5798c7af6c4470dea5f650f677
SHA25691024899fb3da63390e82a95dc13043d13a1cbecab245ec6bf93cb599923b23b
SHA512191865c5daf8a7caafef3c3b661a3b2149f07cf7f99f191664388c3fd525ada4529106914ceeb5c1f46906fc7ba49c575ca316a1bfb8c69ada5e0fa16b49c84e
-
Filesize
15KB
MD52b9cd618278fb0214493e93f5b86d2d9
SHA1fecece988a3c7c620f6c0f03e92529626cad7fcf
SHA256f548b594407ab1992d05eae198a32fa86637a2c7fdabeeeb1ca20f250ceb10d3
SHA51238d6be57aba7033c39562c8f54e47383ad80627143bf4fb3ce3611c1679fbfe06e12e3d49bb55bdf77381b105f836b999dc7441a22b3a3f79e56ee0034f04552
-
Filesize
172KB
MD51390ee1b8ebf0c48c7259dba60901687
SHA15d0db6d481ebd9cf7efc545bbcb4878c9b95b41f
SHA25627f3c0ca89254be49fd8437abaf9a776a595dda8b593bf5568b357843b6909ca
SHA512046c02e84663e04cacb77db871ea1ed3976b18872ab4955ef2e701c06e9a50a40cc8a4b4aeceea3530951270b9bd2fd71003dc0c6efd5a1b56d49ed38e65f3fe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
3.0MB
MD540879d7587eed9df399dc5ec0e18d305
SHA1e8660a88bc70457259b13c2198bd7b0f88827cd6
SHA256d30cd1e5c765f6cb2ddfc16c8f1611ef575ef6b8fd7030930bca9433f8edbe25
SHA5124eaccb3edadc0685c2e845a199e34cfb18cbf17054b5fb4276ef0a1c4a5e46cd397ae8fddd57f5cc9a39c4ba3625a3216f7d44cf090a12949460b5bf3675635b
-
C:\Users\Admin\Downloads\697158bcade7373ccc9e52ea1171d780988fc845d2b696898654e18954578920.zip.crdownload
Filesize3.0MB
MD540879d7587eed9df399dc5ec0e18d305
SHA1e8660a88bc70457259b13c2198bd7b0f88827cd6
SHA256d30cd1e5c765f6cb2ddfc16c8f1611ef575ef6b8fd7030930bca9433f8edbe25
SHA5124eaccb3edadc0685c2e845a199e34cfb18cbf17054b5fb4276ef0a1c4a5e46cd397ae8fddd57f5cc9a39c4ba3625a3216f7d44cf090a12949460b5bf3675635b