Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2023, 23:35 UTC
Static task
static1
Behavioral task
behavioral1
Sample
СhrоmеSеtup.appx
Resource
win10v2004-20230915-en
General
-
Target
СhrоmеSеtup.appx
-
Size
10.1MB
-
MD5
1d5e7d2f1e3fc981a5eb32b00c83dbdf
-
SHA1
74e26a41778aa79a77c62f9b95cb85a39ca8c0cc
-
SHA256
b1feff99f4f5f7f17f6fe19dadaa1f53be277fd21a8e749f269d067abeb5a4e5
-
SHA512
43799f0dc0c92dcb98af5e09b6663e62983f99cbc61ef37267d6a26a989d52f59c8dc17314b87432f2457061d1a83852b11f02d5c521cceffec5639aa14688b4
-
SSDEEP
196608:wMGH/COpgGO6vLxuU5hSS1hSDOkj+d0Jf3HOly8XTLWU7Ss9AMClm:wxH//j+jiul3OlyGV7xP
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4788 created 3132 4788 ChromeSetup.exe 54 -
Executes dropped EXE 1 IoCs
pid Process 2832 ChromeSetup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\psmachine.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_es.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_zh-TW.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_lt.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\GoogleCrashHandler.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_kn.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_tr.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\GoogleUpdateComRegisterShell64.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_fr.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_no.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_zh-CN.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\GoogleUpdateBroker.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_el.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_gu.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_sr.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_sw.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_fil.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_ms.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_ro.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\psuser_64.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\GoogleUpdateCore.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_et.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_hi.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_mr.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_pt-BR.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_pt-PT.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\GoogleUpdate.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_de.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_es-419.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_ta.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\GoogleCrashHandler64.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_fa.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_iw.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\psuser.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_fi.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_is.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_ru.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_sk.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_ur.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_vi.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_am.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_ar.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_bn.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_sl.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_te.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_en-GB.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_ml.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_sv.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdate.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_bg.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_cs.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_hu.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_ja.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_lv.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_nl.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_uk.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\GoogleUpdateOnDemand.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_ca.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_hr.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_id.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_it.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_ko.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUMA931.tmp\goopdateres_th.dll ChromeSetup.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUTA932.tmp ChromeSetup.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1208 powershell.exe 1208 powershell.exe 4788 ChromeSetup.exe 4788 ChromeSetup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1208 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4788 wrote to memory of 2832 4788 ChromeSetup.exe 86 PID 4788 wrote to memory of 2832 4788 ChromeSetup.exe 86 PID 4788 wrote to memory of 2832 4788 ChromeSetup.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3132
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start shell:AppsFolder\GoogleLLC.Chrome_gmwsd4vw032t2!Chrome2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Program Files\WindowsApps\GoogleLLC.Chrome_116.0.5845.141_x64__gmwsd4vw032t2\ChromeSetup.exe"C:\Program Files\WindowsApps\GoogleLLC.Chrome_116.0.5845.141_x64__gmwsd4vw032t2\ChromeSetup.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4788
-
-
C:\Users\Admin\AppData\Roaming\wscinterop\PONDVQYPNAHZWHMWF\ChromeSetup.exeC:\Users\Admin\AppData\Roaming\wscinterop\PONDVQYPNAHZWHMWF\ChromeSetup.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2832
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestcrl.comodoca.comIN AResponsecrl.comodoca.comIN CNAMEcrl.comodoca.com.cdn.cloudflare.netcrl.comodoca.com.cdn.cloudflare.netIN A104.18.15.101crl.comodoca.com.cdn.cloudflare.netIN A104.18.14.101
-
Remote address:104.18.15.101:80RequestGET /AAACertificateServices.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: crl.comodoca.com
ResponseHTTP/1.1 200 OK
Content-Type: application/pkix-crl
Content-Length: 506
Connection: keep-alive
Last-Modified: Sun, 17 Sep 2023 21:44:03 GMT
ETag: "65077323-1fa"
X-CCACDN-Mirror-ID: sscrl1
Cache-Control: max-age=14400, s-maxage=3600
Expires: Sun, 24 Sep 2023 21:44:03 GMT
X-CCACDN-Proxy-ID: mcdpinlb6
X-Frame-Options: SAMEORIGIN
CF-Cache-Status: HIT
Age: 3252
Accept-Ranges: bytes
Server: cloudflare
CF-RAY: 80852a868f06b7e2-AMS
-
Remote address:8.8.8.8:53Request101.15.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request101.14.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestmetmuseum.orgIN AResponsemetmuseum.orgIN A76.76.21.21
-
Remote address:76.76.21.21:443RequestGET / HTTP/1.1
Connection: Keep-Alive
Host: metmuseum.org
ResponseHTTP/1.1 308 Permanent Redirect
Connection: keep-alive
Content-Type: text/plain
Date: Sun, 17 Sep 2023 23:35:44 GMT
Location: https://www.metmuseum.org/
Refresh: 0;url=https://www.metmuseum.org/
Server: Vercel
Strict-Transport-Security: max-age=63072000
X-Vercel-Cache: MISS
X-Vercel-Id: fra1::m6fhl-1694993744775-580c3be607b2
Transfer-Encoding: chunked
-
Remote address:8.8.8.8:53Requestwww.metmuseum.orgIN AResponsewww.metmuseum.orgIN CNAMEcname.vercel-dns.comcname.vercel-dns.comIN A76.76.21.61cname.vercel-dns.comIN A76.76.21.241
-
Remote address:76.76.21.61:443RequestGET / HTTP/1.1
Connection: Keep-Alive
Host: www.metmuseum.org
ResponseHTTP/1.1 200 OK
Cache-Control: public, max-age=0, must-revalidate
Connection: keep-alive
Content-Length: 302089
Content-Type: text/html; charset=utf-8
Date: Sun, 17 Sep 2023 20:36:37 GMT
Etag: "3w2kxf4ve56gwx"
Permissions-Policy: accelerometer=(), autoplay=(self), camera=(), fullscreen=(self 'https://player.cnevids.com'), geolocation=(), gyroscope=(), interest-cohort=(), magnetometer=(), microphone=(), payment=(), sync-xhr=(self)
Referrer-Policy: strict-origin-when-cross-origin
Server: Vercel
Strict-Transport-Security: max-age=63072000
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Matched-Path: /en
X-Powered-By: Next.js
X-Vercel-Cache: HIT
X-Vercel-Id: fra1::iad1::bxxwd-1694993744916-6a01022b25b7
-
Remote address:8.8.8.8:53Request21.21.76.76.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request61.21.76.76.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.81.21.72.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request121.208.253.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.173.189.20.in-addr.arpaIN PTRResponse
-
419 B 1.2kB 6 4
HTTP Request
GET http://crl.comodoca.com/AAACertificateServices.crlHTTP Response
200 -
859 B 6.0kB 11 10
HTTP Request
GET https://metmuseum.org/HTTP Response
308 -
6.1kB 319.0kB 125 236
HTTP Request
GET https://www.metmuseum.org/HTTP Response
200
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.159.190.20.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
62 B 143 B 1 1
DNS Request
crl.comodoca.com
DNS Response
104.18.15.101104.18.14.101
-
72 B 134 B 1 1
DNS Request
101.15.18.104.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
101.14.18.104.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
59 B 75 B 1 1
DNS Request
metmuseum.org
DNS Response
76.76.21.21
-
63 B 129 B 1 1
DNS Request
www.metmuseum.org
DNS Response
76.76.21.6176.76.21.241
-
70 B 124 B 1 1
DNS Request
21.21.76.76.in-addr.arpa
-
70 B 124 B 1 1
DNS Request
61.21.76.76.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
71 B 142 B 1 1
DNS Request
240.81.21.72.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
121.208.253.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.236.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.173.189.20.in-addr.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\GoogleLLC.Chrome_gmwsd4vw032t2\LocalCache\Roaming\wscinterop\PONDVQYPNAHZWHMWF\ChromeSetup.exe
Filesize1.3MB
MD55f0299e8aa87a9c4ac70ed9f7dc8bb69
SHA1b8d65ffa13dd75ceff65c22f1bc9c6eece28a0e7
SHA256f6b1f463677c99ac7b68241758bf9bf756d448e4d35152c7ff3722c2d1c144da
SHA51237f31078d6965dd0adc585f1f1f062366c5c51b80d681c7d7d987becb8e8697308e96a20ccd990166139226c62db48d1cfa540423930906ff800697ac37bcdfa
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82