Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/11/2023, 14:59
231103-scqn6afe27 102/11/2023, 19:33
231102-x9hr2aed2z 102/11/2023, 19:29
231102-x7mcfaec8z 102/11/2023, 19:28
231102-x6t1wsec7y 102/11/2023, 19:27
231102-x6crlsec6x 302/11/2023, 17:49
231102-wd3xnadd2z 102/11/2023, 17:47
231102-wc6l6adc9x 102/11/2023, 17:13
231102-vrh9qscg71 102/11/2023, 15:35
231102-s1teysga64 102/11/2023, 15:29
231102-sxbqqsfh62 1Analysis
-
max time kernel
5s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/10/2023, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
download - 2023-05-02T122403.690.jpg
Resource
win7-20230831-en
General
-
Target
download - 2023-05-02T122403.690.jpg
-
Size
8KB
-
MD5
dffa55f5e8bbd052dd4d0c371b69c3e3
-
SHA1
8298da424a8f9d9ee9f4957caddee146ea4c7f45
-
SHA256
1af9c152e70466c1e5c501808e2f836bc6f1121567d8493ca95f4ed2de7aeb95
-
SHA512
0da149201a925919336163d387157a00cbe2992cc6685b4b6731c89893234992661033e0e627890a9d7b755bef931e4e0233100a98ae13903f2128066d22a7b8
-
SSDEEP
192:luNs2r9h88h6Bnilz/ApE8xcbBNA+acabmInqhaqoZusQaIrRUiauXe9:4NBdh6N6/ApzxcLAjfqboZnIBzM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2668 2592 chrome.exe 29 PID 2592 wrote to memory of 2668 2592 chrome.exe 29 PID 2592 wrote to memory of 2668 2592 chrome.exe 29 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2632 2592 chrome.exe 31 PID 2592 wrote to memory of 2456 2592 chrome.exe 33 PID 2592 wrote to memory of 2456 2592 chrome.exe 33 PID 2592 wrote to memory of 2456 2592 chrome.exe 33 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32 PID 2592 wrote to memory of 2496 2592 chrome.exe 32
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen "C:\Users\Admin\AppData\Local\Temp\download - 2023-05-02T122403.690.jpg"1⤵PID:2552
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7889758,0x7fef7889768,0x7fef78897782⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:22⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1536 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:82⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:12⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1780 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:12⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1120 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:22⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3176 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3416 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3540 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3980 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:82⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3728 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:12⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2504 --field-trial-handle=1368,i,4036085171532260467,2757871935462367047,131072 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD5589a3e6ef6d9b6f4ca1ad49254e2c72d
SHA13df9f582888fb9b6d7625c7116a96fb8119951f0
SHA256b9fddbfd574070fbab8a0ba30334f9b47620e9a0b3a7a73ce8e4e72abd7f75d0
SHA51273aa70419bd7fa7786fb09bd6b0291f406e0629c24d536982fc796abf0bd2f35619c790f7c78c964c70b793a1dd6321e94b20ca6296d256aac30e477993b19a5
-
Filesize
4KB
MD59cfd60c47071280264ed544e0da52073
SHA197a9526d057cdd32357a10917365117c523c439d
SHA2567515d7c7921e08ac6471f06d0df598d6f4508b71a7ceac56fa333cc876f00ee0
SHA5127608ce81049d79589470298972db290c65156fce0c763180956d4a0cdfe84d25e6587a9ce148c142f769ecd5fb5ee4ede9fbcefb271434045d8580c24021f400
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
64KB
MD5a3cea48989c23fdf07c49d91c6134eb3
SHA1a5edcb8935a67fa5338a75aeb551eaac961cbe67
SHA25671a314c390f153e63b998c65b9ed9f51ab8205aa384192ddde74bcdc922c1c69
SHA5120277c87c1e7e115b99123e8e914652ea48d490727a25602e819a0adb2c33633362502f410d4edfbc57a3043453a501850314b60603788adb9b72f7ad84acba41