Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 05:17

General

  • Target

    cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe

  • Size

    1.1MB

  • MD5

    fc157bf81ab006d1bb0a542aaf499c53

  • SHA1

    2b5f22ac2158a90eae8783e05e62171095bbdce7

  • SHA256

    cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909

  • SHA512

    723f661b13ed7cc9444ba0c1038b2db23716bde32ef02f504131a4f11e5a23a9186ec527c0d9291f18194e7193d62687be1f2a5385ffa37d3b1ea95aaac2f8f8

  • SSDEEP

    24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8aHh2+b+HdiJUt:CTvC/MTQYxsWR7aHh2+b+HoJU

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
    "C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3364
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9940c9758,0x7ff9940c9768,0x7ff9940c9778
        3⤵
          PID:2476
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:2
          3⤵
            PID:876
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:8
            3⤵
              PID:4128
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:1
              3⤵
                PID:1824
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:1
                3⤵
                  PID:4412
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:8
                  3⤵
                    PID:4200
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4692 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:1
                    3⤵
                      PID:4292
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:8
                      3⤵
                      • Modifies registry class
                      PID:2336
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4868 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:8
                      3⤵
                        PID:4016
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:8
                        3⤵
                          PID:1568
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5680 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:8
                          3⤵
                            PID:4776
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:8
                            3⤵
                              PID:732
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1900,i,16860612767213404745,1887844126711254725,131072 /prefetch:2
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4164
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:3164

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            312B

                            MD5

                            c4ea822370ee0d7cc49a035853bf26c1

                            SHA1

                            634b6076e350e6957e723647a2dd0b059cd5a0df

                            SHA256

                            68b0794c7c4a8a668cfaf7e5accad63d71db05b694818117d28cb253bcec62ef

                            SHA512

                            f00ce76911f68cd5104659aa3fc4bc9ce0601d5c58ec702a2b5148b2eec74db8cf8d4d37ba0e287a2c33167a5e6ab6be1f16f5c527e25da7399a6f52b553200a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            44e9224e03431bb6b734a3e583fadf0a

                            SHA1

                            b196be12503b981154bc46b9045fa222ff08c42b

                            SHA256

                            2c525d250019de3d850559bc09bb8f7375e7f3ee2a1eb02b0f07e5186543aa12

                            SHA512

                            fde537ba8376ad5c28b9f6888220192fc86b23eba22127600317077b12fad297be0b5f8d85117f21c7df55d35f90298b1a468ee9f1d9df2af76d160c4222dd2e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            f2f738b232e652546cf31e652fb6a342

                            SHA1

                            b6f70e690a5fb707aab6183409060485f4d1276b

                            SHA256

                            1f0073289ddcd002e1375f25c09aaa9b33edf2b36c884bfb5c48e142cc4d369b

                            SHA512

                            00e4ef5fdee47512f6ca911b599b62d653404c79d1307a6feb8192697a41bbcd14852068b40b1bfe2247a77da2efa463a56b262c53ee4ebc7b6cce3fa2435ab0

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            371B

                            MD5

                            cd946be76242efb097972d7f0925c658

                            SHA1

                            38709c2114173c0e76a7d9697862ee7e6b840a57

                            SHA256

                            ba3f48a0a5d5d12e0fed3e52503137933c9bff45109cd0c2f96ab8d283363c97

                            SHA512

                            0b0df2f8f70de3a1a3883b5f977049052ef319a19b4a2db7e9a84823017d5235e80b25d5079c410e0df46dd6d8d96698f03a7ac983ea7817a1e3dfaf164ff229

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            371B

                            MD5

                            3bbf877188c8748635a767729af2b3d3

                            SHA1

                            affdfaeb89edc1754ccae08005b4c8c6f690125a

                            SHA256

                            1d0decfe3a23faf50faedb397184cc66f16932d972657c17818f9afced71feee

                            SHA512

                            e92457116f32dc59e19cf960db1af031a38de04cab16bb19267209b4949a717af1e64aa2c013f49df427e83d8d70ad536ef31ebf5fe5058251cd3747ccdcc40f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            371B

                            MD5

                            6cd2a7c95e63dcf7dd5f808431dff063

                            SHA1

                            a49e0beb0134946d290b424ffb12991cd8004f01

                            SHA256

                            9a1b052908225160f8ad4855e1c871079fd4cc666b2bea95cbf716dbdcfae572

                            SHA512

                            f46642f54a714c91c8f03ce40e1ad5b6461823939a7260d596999e623e6370b264b2841c2353181414e3c617ad3eaf35c35d77247d01c827372f1a2db8380217

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            9e85d1b043ef928c8f624b95a21760ce

                            SHA1

                            7ca29559e9a2419ff1999419056ed3ec080c77e6

                            SHA256

                            a1ca34619d434c7986c98be4636df0891f7bfe537bbb8260436ee2b66c521386

                            SHA512

                            436413fb590f8edce4cef472c3e641957d9403d5b6f1b39365ff9ffd730128bb602da465281f24363185d8117480b25cf1d8bddc4c0644f5fa217c7400b7968d

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            15KB

                            MD5

                            3cd7cb0e593b67e5192f7052fdccac97

                            SHA1

                            49175a62b27ea4b0d8f0430c4a33a90de799322b

                            SHA256

                            2efa38006f040f508699791fd9f125c461f7079d85589c163e030b7bee4e5f52

                            SHA512

                            b75798a3cfea2a160dbf2bf31c5504d5d7ceb323fd21d71c0a74793b5ecbf48ea0e18d2e960feddf25c00954cb988a8d509a35636f88a6a0cbab8eec323b7db8

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\b357aa22-6895-45fb-8450-139c165c6b8b.tmp

                            Filesize

                            238KB

                            MD5

                            6b95814c85e00fbcc50f70432143b26e

                            SHA1

                            e63b53c9af2b06128463405fecaa23c9be9e8eca

                            SHA256

                            1be68743489471a127cb2403d196507a0bc9a68aeda0db64e6cd3ab3f046ed7d

                            SHA512

                            84f6a2a6d8792ffa09f199581d060940d7f5d7c285cfc2d626bb1d01e01a4fd432f946aedfd0998a08dd2262153c9e539de8d2711a0fa25ebdda353247ab6b1b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd