Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
Resource
win10v2004-20231215-en
General
-
Target
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe
-
Size
1.1MB
-
MD5
fc157bf81ab006d1bb0a542aaf499c53
-
SHA1
2b5f22ac2158a90eae8783e05e62171095bbdce7
-
SHA256
cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909
-
SHA512
723f661b13ed7cc9444ba0c1038b2db23716bde32ef02f504131a4f11e5a23a9186ec527c0d9291f18194e7193d62687be1f2a5385ffa37d3b1ea95aaac2f8f8
-
SSDEEP
24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8aHh2+b+HdiJUt:CTvC/MTQYxsWR7aHh2+b+HoJU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1912 chrome.exe 1912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1912 chrome.exe 1912 chrome.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1912 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 2088 wrote to memory of 1912 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 2088 wrote to memory of 1912 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 2088 wrote to memory of 1912 2088 cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe 28 PID 1912 wrote to memory of 2668 1912 chrome.exe 29 PID 1912 wrote to memory of 2668 1912 chrome.exe 29 PID 1912 wrote to memory of 2668 1912 chrome.exe 29 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 2652 1912 chrome.exe 31 PID 1912 wrote to memory of 1940 1912 chrome.exe 32 PID 1912 wrote to memory of 1940 1912 chrome.exe 32 PID 1912 wrote to memory of 1940 1912 chrome.exe 32 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33 PID 1912 wrote to memory of 3040 1912 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe"C:\Users\Admin\AppData\Local\Temp\cadcd8c01844efd569e6d84e5cf516261a8e43450b2b22d8227a710eaa524909.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f19758,0x7fef6f19768,0x7fef6f197783⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1320,i,3115093822331627,811362200861361680,131072 /prefetch:23⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1320,i,3115093822331627,811362200861361680,131072 /prefetch:83⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1320,i,3115093822331627,811362200861361680,131072 /prefetch:83⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1320,i,3115093822331627,811362200861361680,131072 /prefetch:13⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2260 --field-trial-handle=1320,i,3115093822331627,811362200861361680,131072 /prefetch:13⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1404 --field-trial-handle=1320,i,3115093822331627,811362200861361680,131072 /prefetch:23⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2908 --field-trial-handle=1320,i,3115093822331627,811362200861361680,131072 /prefetch:13⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3444 --field-trial-handle=1320,i,3115093822331627,811362200861361680,131072 /prefetch:83⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4100 --field-trial-handle=1320,i,3115093822331627,811362200861361680,131072 /prefetch:83⤵PID:1180
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5f63cbd51bc770cff16402e664092ce40
SHA1cd88f5ec23766e14b4025356abe64762e9c9d800
SHA256956551ba8b78f8e7643748a790d49b12fdd5957667db9572f9ef386f5b0368e7
SHA512995e84378bf5d7fa0385eec1291691a684c87bf07ffc3be1a013b8b31b847f2d30c4243dc0bef2dcbab64075ac9fafb5e1cae1dd25a81329d8372fec987dbce6
-
Filesize
363B
MD5e329fdc6b0ce3f75f63049d7efac8c22
SHA176731b77a93ac5f40166bccf3855678fc0ab1431
SHA2568e0d2c4b8e456641e0dcf88b0f8f75341674a0a145e62f4c4a5eaa3ce8eb2634
SHA512de21eacfc09a8f03be74a7977dd5c5dea7993e42543ce1ffeaff543f4208b2d9f438671280bc4c28fb8d2511e821c179783b42583ae96f04547ac3e3c484479c
-
Filesize
5KB
MD50ee45a02f21b54dd4628135a4a667a54
SHA1e71ecf7a22cd287f6f791e407d038a91e4ef4bf0
SHA2569c7267522de56567294c5433926ab89ff32ea852be97d7f283d3ede941c28620
SHA512db95d7444eb3373d8cbf07976a1710ae556c13a2a0089a50a31ce3698c294b3faa647919162cb50de63d4f1fa8095d96c87d7251356e7396d00399426860f7ba
-
Filesize
5KB
MD5e9bd8ff4caf655116a2954d01c2b86a2
SHA13fe5631bd6ff68b3913a49059951d8d140f43c77
SHA2562ef721f0fdd0f6281479002b85412e39d151ac41a788dbdc05cfef552dd6a953
SHA512a5543f60ff078ff5ade0021b7f2410324476ed3cac689c23010b45cbaeed625577baeb6be909690521a89582f5564f5f560fbc3530e1a97e3542a65d37690f5a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2