Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/12/2023, 15:17

231211-spcytsbfh9 1

11/12/2023, 15:16

231211-snyh5sbfg9 1

11/12/2023, 15:12

231211-sljxzaachl 1

Analysis

  • max time kernel
    113s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 15:12

General

  • Target

    trigger.html

  • Size

    15KB

  • MD5

    c9abab16fcff36d1c6ffa846e19213af

  • SHA1

    6d3ab22a1c997c5002756e7a5174b459cb5863fb

  • SHA256

    c756569190654cdc9d5742652970bfe2b6e2e8dcdf080349b1ecc741a40c833c

  • SHA512

    d3dbd9ada2fbbceb436b267da28a3110648d46ce56a3fa9f976a470bfea8e41c849db2aa41e483b41bb5ca8c757cc1b4f150ead62ebddf3f85a5b1bfa3a3b119

  • SSDEEP

    384:T6cNwXEY5p0PqwY+eGNigjHGtec90oi/XhsY8Fhm:T6okEYYY4JrGte+0T/Xhsdo

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\trigger.html
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff8f8989758,0x7ff8f8989768,0x7ff8f8989778
      2⤵
        PID:3388
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:2
        2⤵
          PID:4928
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:8
          2⤵
            PID:656
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:1
            2⤵
              PID:4524
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:1
              2⤵
                PID:4080
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:8
                2⤵
                  PID:5052
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:8
                  2⤵
                    PID:3368
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1784,i,12834925091955052050,13042377290487687097,131072 /prefetch:8
                    2⤵
                      PID:5080
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:1448

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

                      Filesize

                      1KB

                      MD5

                      55540a230bdab55187a841cfe1aa1545

                      SHA1

                      363e4734f757bdeb89868efe94907774a327695e

                      SHA256

                      d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

                      SHA512

                      c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

                      Filesize

                      230B

                      MD5

                      828f2acb12749971a80f0d4e95fc98aa

                      SHA1

                      9a314f213ba52fb1742aa265dfdac5ba66113dd0

                      SHA256

                      2233ee818067669a36917926979c8cab62449b28a017f40993458e0f9836d267

                      SHA512

                      9402a42d3412f770f816e00e5c2d99427282422730bd552d290a47c81584b1d01187e0f50b1585b4fa659801d61b6da52a8c626e667c8e70a7e3d0e71dfb5070

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                      Filesize

                      2KB

                      MD5

                      fb83d2ac333cd04ab3ca12a00c2fc4af

                      SHA1

                      b1c644a6a248aa0f1c5b07de8ba7ab2943405237

                      SHA256

                      db1b4b5791c2403b2fe157d94ac32ea2580ed2dcaced45cd04d11887ea4df986

                      SHA512

                      aaa0abec3c21c273cbd82392139bb470ff90f820b28baf5ef08b0ed775ea72299ac45b72faed9a0edd7e7bffd6014b4ae8b32441caa337ed4356886e674d2c3a

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                      Filesize

                      539B

                      MD5

                      9ecc604336b834b13108c112adbc1235

                      SHA1

                      0dba9de7fef40d22bb6b52343fb55cb53afc3737

                      SHA256

                      6b4e030c52f40dd086b7418ce40159db0b776676758a55280fe47ea3b748d92d

                      SHA512

                      622035ff8f93fd178b533b952436d2eede3a80d3b3c82870e7fd565c195addd9f0527ce8416ce39a668073271497a292b8c2eb0ecd8e74dc40ba8a46238ba74e

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      5103a93e831753111c69535c6c846283

                      SHA1

                      dcb8c8ea4a179fae14bbac30a60d3983b25003f4

                      SHA256

                      b88fdef8afe0401fcab0ad7b28f8cb2c948eb6a6fe4663aafff9c636ae64a53f

                      SHA512

                      548dced728f30709009cf2a2c2faf6667fe038ed144ad812569acfa95215b3dd73d9478b850c43bfcb9d4adad47384447f27d392a4b2aa04002deb383be54610

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      8dadf2f7880ba08fd0d2d45c877dd557

                      SHA1

                      7eb032e1eb18fb76cb3c7ca4eb8ff7d8991f10a4

                      SHA256

                      c7727e08304b05f6cac9651374a5ef4a2f3be0784b647b65e3239d726815d645

                      SHA512

                      8b65e8e8ff790ccfdc084c0c420d9e63dd05168ef26ff9bc4d955b1a21dc17f3516f2f0f120ae149cf2eadb5a82154d3ed4056a601998565a040790ff0e24f68

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                      Filesize

                      115KB

                      MD5

                      d18e02d3f36c467a78372ee63ee9293c

                      SHA1

                      450e48b8916a2cfc603c5cb4d871778b0a01753c

                      SHA256

                      66916d30f3d1e2a896df879131774c07fbd03bbab34fa47163cb1bd2510d2025

                      SHA512

                      da4a6c273ed8e998e5c797a3ee1b752befecffd0ea31816367f8bc043591a427f5ffd09665f50451bbc6365de973e1f2dfa958ed4e5923e733095356beb6e3e3

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                      Filesize

                      2B

                      MD5

                      99914b932bd37a50b983c5e7c90ae93b

                      SHA1

                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                      SHA256

                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                      SHA512

                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd