Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/01/2024, 13:55
240110-q8lzqsgfgk 110/01/2024, 13:55
240110-q74hdsgffl 105/12/2023, 14:24
231205-rq4bqsbh77 705/12/2023, 14:23
231205-rqbxgsbe6w 105/12/2023, 14:10
231205-rgypwsbd71 105/12/2023, 13:54
231205-q7rtlabd2y 814/11/2023, 14:09
231114-rgcgnacg7s 6Analysis
-
max time kernel
62s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
05/12/2023, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20231130-en
General
-
Target
.html
-
Size
14KB
-
MD5
cf9283c6d5b9f12e3834dc202b82fa67
-
SHA1
b49cf7a36baadab49b38b16b60e82805a62684cc
-
SHA256
8b5a76c03b0494601a599296a59cefdcaa9168527328edcefbcdef703c4e3d0b
-
SHA512
c4cb83f0e0a261df41ef046799073750c92e2d368c4b29151ebc4c78d83a1dd32e84ddbf35df931861e0ff1f5e4b7a4f5e9871fc121bf3c24653f1d0bb8f82f4
-
SSDEEP
384:rXvNgIfDpmRgVoOsKHElKeGMDU8Hhhb0vmx28cSz:r/5fVoOsKkI1M7Bhb6mdB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe Token: SeShutdownPrivilege 2360 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2396 2360 chrome.exe 28 PID 2360 wrote to memory of 2396 2360 chrome.exe 28 PID 2360 wrote to memory of 2396 2360 chrome.exe 28 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2660 2360 chrome.exe 32 PID 2360 wrote to memory of 2880 2360 chrome.exe 30 PID 2360 wrote to memory of 2880 2360 chrome.exe 30 PID 2360 wrote to memory of 2880 2360 chrome.exe 30 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31 PID 2360 wrote to memory of 2788 2360 chrome.exe 31
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7c79758,0x7fef7c79768,0x7fef7c797782⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1552 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:82⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:22⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2212 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2204 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:12⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1292 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:22⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2968 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:82⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2984 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:12⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2532 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:12⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3024 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:12⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=768 --field-trial-handle=1216,i,2029755856535681905,10196548880587917324,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
5KB
MD5350e75438eb2f83ff7408414ae6c9f2a
SHA11d8b16311bb05e6ef04fc095730cff5ee366a8ce
SHA25637f0ede93d88f32a2b5c5248af6f7c0471d04166500bbf7cc22159b85c000983
SHA51259c7c6b983ebe1e4dffc50a4265604a0093fa5cabed88b70a2c6aed169749a4b3c39024365575dd99a216a82b1c03faa49ae937383cc24a73e8d1491b3e2523e
-
Filesize
5KB
MD54b9d44aad9fc5a6471689251882ac0fb
SHA1cc32b1eb0462140ac600415fa18e15e9e57a00f9
SHA256caeb15f9228d977a9eedf89e93d17906dfa0843814d45d01441f984be411bd43
SHA512accd5ba727d11af63127a333a73cc7791366a1bd69a768a32769b501c306f446ae388d7a6b3337be01931d25b2b1d6ae8158b43615aafd1e13322c8ada139d04
-
Filesize
5KB
MD567f272842f39505723836195d097f90e
SHA1a60ed4b967e363648791cb1b8fcace0b08496bab
SHA2563623631c36495ab7845860e0ca5f4ea05b97a19da7ab5908161ae54aca08aede
SHA512cede4ecb7b0eada3235b4a08f547490924a8cbe11b0d5d3fa463a9ce1116bd0839b8f98b5646448f2e19996e1fe374ad67b487103ab2ed89e972eddefed6686e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2