Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
81s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-de -
resource tags
arch:x64arch:x86image:win10v2004-20230703-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
22/08/2023, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
DesignTest.exe
Resource
win10v2004-20230703-de
General
-
Target
DesignTest.exe
-
Size
1.9MB
-
MD5
2dd4611978e4c4e83dc4db659e2fd7b1
-
SHA1
4a54f66052cbadde9a327df6ba8dda2f6ef20aff
-
SHA256
29540dce73b252d789a66ca395786528ed13e24beaf4002164de3594aa256648
-
SHA512
b4a10732f861874ee7a957765b301fe181ddb997dbee45d973eec7bdb57d92d42e1a8d34717c551f2d929deac14e6af149cb8e5da0b8af87a4b279ce4b90aa83
-
SSDEEP
24576:sf8Uph/gxXMFf4VZCt/lz+1gkdU1eHXnnhaa9:Up6RMZ5lCgkdU+n/9
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3564 3740 WerFault.exe 26 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133371806127494945" chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 688 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4048 mspaint.exe 4048 mspaint.exe 936 chrome.exe 936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4048 mspaint.exe 4048 mspaint.exe 4048 mspaint.exe 4048 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 936 wrote to memory of 3156 936 chrome.exe 107 PID 936 wrote to memory of 3156 936 chrome.exe 107 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 2976 936 chrome.exe 110 PID 936 wrote to memory of 4292 936 chrome.exe 108 PID 936 wrote to memory of 4292 936 chrome.exe 108 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109 PID 936 wrote to memory of 4920 936 chrome.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\DesignTest.exe"C:\Users\Admin\AppData\Local\Temp\DesignTest.exe"1⤵PID:2184
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SkipMerge.txt1⤵
- Opens file in notepad (likely ransom note)
PID:688
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\UseGroup.bmp"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:912
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 3740 -ip 37401⤵PID:2464
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3740 -s 22561⤵
- Program crash
PID:3564
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe92d19758,0x7ffe92d19768,0x7ffe92d197782⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1952,i,3188444053135636389,3132729342494681675,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2304 --field-trial-handle=1952,i,3188444053135636389,3132729342494681675,131072 /prefetch:82⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1952,i,3188444053135636389,3132729342494681675,131072 /prefetch:22⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3228 --field-trial-handle=1952,i,3188444053135636389,3132729342494681675,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3252 --field-trial-handle=1952,i,3188444053135636389,3132729342494681675,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4060 --field-trial-handle=1952,i,3188444053135636389,3132729342494681675,131072 /prefetch:12⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4748 --field-trial-handle=1952,i,3188444053135636389,3132729342494681675,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4880 --field-trial-handle=1952,i,3188444053135636389,3132729342494681675,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1952,i,3188444053135636389,3132729342494681675,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1952,i,3188444053135636389,3132729342494681675,131072 /prefetch:82⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1940
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd