Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
25/08/2023, 19:28
230825-x6nh4sed89 325/08/2023, 19:25
230825-x4yajaed83 325/08/2023, 19:22
230825-x28y9agb5t 325/08/2023, 19:18
230825-xz868sed73 325/08/2023, 19:15
230825-xyk31sed56 325/08/2023, 19:12
230825-xwt8xaed43 325/08/2023, 19:09
230825-xts8tsga8w 3Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25/08/2023, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
images.jpg
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
images.jpg
Resource
win10v2004-20230703-en
General
-
Target
images.jpg
-
Size
1KB
-
MD5
8d24c2a9fbd7f5fc17ca40f7932d15c7
-
SHA1
10e5623bfe4d2ea662c7d09ba426695f8b9be83c
-
SHA256
57607249ad1cb9a5c62ff16b2fa9c72e0e2f33bd211daf006a4ce372068d301f
-
SHA512
99b287f0b19f91ee2e0d5b40ba860fa90674d4d613f1309b87bd5739a70efe23f59613fc2f3c96234d52cd4fc1f94b02b73f89f40dee9685ea4d3069d69a1cdb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2228 chrome.exe 2228 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 1500 rundll32.exe 1500 rundll32.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2504 2228 chrome.exe 29 PID 2228 wrote to memory of 2504 2228 chrome.exe 29 PID 2228 wrote to memory of 2504 2228 chrome.exe 29 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2896 2228 chrome.exe 31 PID 2228 wrote to memory of 2824 2228 chrome.exe 33 PID 2228 wrote to memory of 2824 2228 chrome.exe 33 PID 2228 wrote to memory of 2824 2228 chrome.exe 33 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32 PID 2228 wrote to memory of 1224 2228 chrome.exe 32
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\images.jpg1⤵
- Suspicious use of FindShellTrayWindow
PID:1500
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7289758,0x7fef7289768,0x7fef72897782⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:22⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1548 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:82⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:12⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1380 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:22⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1360 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3492 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:82⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3612 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:82⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3520 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:82⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2092
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fe37688,0x13fe37698,0x13fe376a83⤵PID:1284
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3772 --field-trial-handle=1288,i,13079350116679513787,12129109004222054355,131072 /prefetch:12⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:1544
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f4f7688,0x13f4f7698,0x13f4f76a83⤵PID:1576
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\19d4a66c-989d-4899-9d74-ce9ad93758a5.tmp
Filesize4KB
MD5574079dc82d43dd98d4712eb3aca13ff
SHA1ce5a84a3195d1f833032c3eb7e3fe5da5ea5d661
SHA2561bcb91088e26289642878d727fc19d6904b3332f328054c6af5cafc24a793324
SHA5125bf18b3d15902d6934c80b2165483f66a0039c37f71904a3859362884cae8eb2db72a8998eb9cec0981a4c9ffcc638aa6314577821e2ccb6b3f6543057241683
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
180KB
MD5e0307354ea310ef4236db2f8e5242580
SHA1078accc8182fdcec662708d5c68c836822666cf0
SHA256b2bfec0e5f14f76a6bbac8567e5d2d01446387840b689193d24c63d6f7eea94b
SHA5122c46b14f601ed4ff5d7d75e59fba4479102809c5cbcb66e5c7d1dae04f18d481eca507dbebd8ddadbd1167e0a43bee592e45e0019c0e4926d2033dcb40a331de
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
180KB
MD5e5b2c8f4a35af97db597aefc34635eda
SHA13a13b90cc984c9ad5cac8ef0aca47e0548136f0c
SHA256f796b2fd9d1c70d8c2a56ebf3616799ff909b495d4bbdfadc64dfe010bbbf654
SHA5121422ddd97e3cb03512e800c163f06e2a4e7fa994530d16350b777d14ccf37ec3310f6851203d039ecbdd71dca7da54d62e904741490920ac297a3137c84b79fb
-
Filesize
40B
MD5f57a3d829450d921ab8951c0700c124a
SHA1ba50d26f31367c50f405d50cbf594699369b69e9
SHA2560c504587909e4d9980857dc4af8c79ddca5a1d3617dd8311fe51da752feb2553
SHA512b51247846911081fbcc3235a1c09fd20fac1da66f2a96d2e79339683cd4c160914dd29299c8092270e758dda919fb8856fede46683c7318f8ed501ba693d1f37