Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/01/2024, 01:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://list-manage.krmnkl.com/t/c/NzgwYThjNTYtOTdmYS00MDIxLWJjNDQtZWZmNGJhMjE0NWYx/8142424a2d9dc397a31ef9dd6f6a030f8bccadf69561a97a51ff862f3673b73a/81?redir=onevmoierwtoiuwe.com%2F1F1Om66
Resource
win11-20231222-en
Behavioral task
behavioral2
Sample
https://list-manage.krmnkl.com/t/c/NzgwYThjNTYtOTdmYS00MDIxLWJjNDQtZWZmNGJhMjE0NWYx/8142424a2d9dc397a31ef9dd6f6a030f8bccadf69561a97a51ff862f3673b73a/81?redir=onevmoierwtoiuwe.com%2F1F1Om66
Resource
macos-20231201-en
General
-
Target
https://list-manage.krmnkl.com/t/c/NzgwYThjNTYtOTdmYS00MDIxLWJjNDQtZWZmNGJhMjE0NWYx/8142424a2d9dc397a31ef9dd6f6a030f8bccadf69561a97a51ff862f3673b73a/81?redir=onevmoierwtoiuwe.com%2F1F1Om66
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3500 wrote to memory of 4432 3500 chrome.exe 16 PID 3500 wrote to memory of 4432 3500 chrome.exe 16 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 3908 3500 chrome.exe 30 PID 3500 wrote to memory of 244 3500 chrome.exe 29 PID 3500 wrote to memory of 244 3500 chrome.exe 29
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb6e4e9758,0x7ffb6e4e9768,0x7ffb6e4e97781⤵PID:4432
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://list-manage.krmnkl.com/t/c/NzgwYThjNTYtOTdmYS00MDIxLWJjNDQtZWZmNGJhMjE0NWYx/8142424a2d9dc397a31ef9dd6f6a030f8bccadf69561a97a51ff862f3673b73a/81?redir=onevmoierwtoiuwe.com%2F1F1Om661⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1836,i,14421863252942809757,8102670142600421726,131072 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1836,i,14421863252942809757,8102670142600421726,131072 /prefetch:12⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1836,i,14421863252942809757,8102670142600421726,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1940 --field-trial-handle=1836,i,14421863252942809757,8102670142600421726,131072 /prefetch:82⤵PID:244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 --field-trial-handle=1836,i,14421863252942809757,8102670142600421726,131072 /prefetch:22⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1836,i,14421863252942809757,8102670142600421726,131072 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1836,i,14421863252942809757,8102670142600421726,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4592 --field-trial-handle=1836,i,14421863252942809757,8102670142600421726,131072 /prefetch:12⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1836,i,14421863252942809757,8102670142600421726,131072 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4472 --field-trial-handle=1836,i,14421863252942809757,8102670142600421726,131072 /prefetch:22⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5c91cd63c939430e0c207114fa7d1d574
SHA1b878c92d62233567a4d7560390710907a24055af
SHA2569123b95ac4aeb27487db402f8ee917c2430b751d63236020b4f5c8d221aa04b7
SHA51230428103eddba91ee34ab347a2423e31b27f0e02a7bc98c983bbfac1b31310f8bd98eee571f71b64bbce6c418d20368ceea415ee8a6856f03da397ed267b7c65
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd