Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/12/2023, 15:35

231211-s1n58scbc4 1

11/12/2023, 15:34

231211-sz6c5acba8 1

11/12/2023, 15:31

231211-sx74yacad5 1

Analysis

  • max time kernel
    300s
  • max time network
    295s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 15:31

General

  • Target

    https://chat.whatsapp.com/E5DWsQMGY8L70v14hzGe26

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chat.whatsapp.com/E5DWsQMGY8L70v14hzGe26
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb8e159758,0x7ffb8e159768,0x7ffb8e159778
      2⤵
        PID:628
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:2
        2⤵
          PID:4276
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2132 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:8
          2⤵
            PID:3300
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:8
            2⤵
              PID:3148
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2156 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:1
              2⤵
                PID:4728
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:1
                2⤵
                  PID:1644
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:1
                  2⤵
                    PID:3404
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:8
                    2⤵
                      PID:4504
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:8
                      2⤵
                        PID:3536
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2812 --field-trial-handle=1912,i,9300099757151106355,3186217789764534021,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2776
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:3672
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                        1⤵
                          PID:944
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                          1⤵
                            PID:1232

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            264B

                            MD5

                            2ff718764ba35b4784ee445ac412a6b2

                            SHA1

                            165667cde4aedea0e2c9aab3aa0193eb9a438649

                            SHA256

                            854d49a060f781ee0d7278369a2e57a58885f0634e632e8efb722020d2184a72

                            SHA512

                            f6fe37e14dd1d3523fea769b1d3622d8018da5dab56119cb2b9349d07844ec1ee1c2572d7645554c3846ac53c2979abb0ad5f3b2771c5ef7cc4a01ce0dad3e6c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            304c66552a6c58c0ee70a87526826dab

                            SHA1

                            29957f0e145440e7a356524aaae1eccbdd179be6

                            SHA256

                            046ef8717003262979380c1c337612ad6483ad700a207606899d8c90e6c38f7a

                            SHA512

                            c7a066e6ebf064f8af4f56bd4d406f0428a940979d029c4d08a91d688df764e1cd97971264167b3e97ed59f40b8b8f7f9dbc92540eca44ebf1df763ff49b672e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            3749b8613a8891b5f938542601d5471c

                            SHA1

                            212ac648241c6cbbbb5579b1cab5604c3101be6d

                            SHA256

                            fbc4f155fc36570844928f87b1d7dda07a6ee1a5fafaeebbf28545c7ec584ebe

                            SHA512

                            fc46eec3f9a2916f16034df17fc695fc8f43241efd507a58bfcf533dcdf4d06e8ec7ae23d69da320893dccb91e897718cdeda66e080d489881748fb12d6f5d75

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            538B

                            MD5

                            dbdb05a3db77e09412a049118372c319

                            SHA1

                            71a985c10305bd76aa778ea49e7e020256ed2c99

                            SHA256

                            80b849b1a78fe35cfb34683b6aafb7fad808862041004db8a7555b2d1e02dff6

                            SHA512

                            5cae8839b2c6ef0b5329142e399cdfe1bca491ebf07891689df365fe8ef8d6eea3f9cc92ad6f88fbe5fe50dcce514392a892839c1ba386ac0d01646526a8b245

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            538B

                            MD5

                            7389db03e982098c2989d634bb23d6a2

                            SHA1

                            1288b187ad98de575775bbdda9fbf9cd431e61af

                            SHA256

                            0875fccc87231be3c1a7a4acc183f4ccb50099c8edec8c4bfab4de3196abbac1

                            SHA512

                            edd4157aaf321abd9ad14cdf20fad627ff6ad7f31ea20445c722e6a1380db49ecc9f8a318b7f55214c94d1e386a2d058bd74dc2bb375ef3b7b34b25386dad86a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            538B

                            MD5

                            ffef3121ac47bf21dc4dee20ed41707f

                            SHA1

                            36d28e3b62cd4635448f62050639f61e79c8aaaa

                            SHA256

                            3f625153353055b34a9d84432ad8b4affca20d6a27eb1867d89bd7abfc9f0603

                            SHA512

                            7aaeddec17e9300ea06d83738b3cb6224d49377577606440e43c7a2127b92dbea069d91eddf29022739d4f414d73ae3edbbc83e9dec5026dbfb69d2fbf48e406

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            01a1b99b3db7098cff185c2a834ff118

                            SHA1

                            7948f7f29c2f54d285b1cef59d70f06b59f2123b

                            SHA256

                            4590229c47adc6b84d72ca142ae1069bcca6769e4314cbe1e5b508e26daad54b

                            SHA512

                            84a325851256345575598894701069a66e065aeea613a92bbf889a95231b66d54930a461cad95c5b9d1762d1bebf2973440f53f546e9f297df438943bfe0f576

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            115KB

                            MD5

                            6e7c7db1979b41575b829a7dc5400538

                            SHA1

                            cebb0a7edf694c87c642367429dc7586b8601a07

                            SHA256

                            2c8067628cf2ef010998411e229e45ba44e227de24442c448cf0a3340c5c451f

                            SHA512

                            c7f2092bb8d5b3368061f5ad723a7a285ff7d8a279f801215f0c37354c929f6b88f0fcf7ef5a5bceff821b295dbc6499e4c1073868b9a74a56f01439ec6a19cc

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                          • memory/1232-104-0x000001F6DDE40000-0x000001F6DDE50000-memory.dmp

                            Filesize

                            64KB

                          • memory/1232-138-0x000001F6E62A0000-0x000001F6E62A1000-memory.dmp

                            Filesize

                            4KB

                          • memory/1232-139-0x000001F6E62A0000-0x000001F6E62A1000-memory.dmp

                            Filesize

                            4KB

                          • memory/1232-140-0x000001F6E63B0000-0x000001F6E63B1000-memory.dmp

                            Filesize

                            4KB

                          • memory/1232-136-0x000001F6E6270000-0x000001F6E6271000-memory.dmp

                            Filesize

                            4KB

                          • memory/1232-120-0x000001F6DDF40000-0x000001F6DDF50000-memory.dmp

                            Filesize

                            64KB