Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
13/02/2024, 15:44
240213-s6rtbadg29 613/02/2024, 14:50
240213-r71xyadc69 613/02/2024, 14:44
240213-r4jt9adc33 613/02/2024, 14:41
240213-r2we9scb21 613/02/2024, 14:40
240213-r17f5scb2t 1Analysis
-
max time kernel
51s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
Untitled document.txt
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Untitled document.txt
Resource
win10v2004-20231222-en
General
-
Target
Untitled document.txt
-
Size
173B
-
MD5
f388b88f4839029e5198fe8e2de36b36
-
SHA1
305c1aaf8d44d9cb4f74cc67c1bbf084aca27acd
-
SHA256
2c433ffb2a21830ae7f7e01afdaf08b9f015492355dacfa51fb139bf4a088f1c
-
SHA512
38e012cb4d4a65691234746bd06f01ef9835f75ea648bc3b0e83d32c220784efede34f44007171be79d87a27763f8d38383bf3e252c8507c4f744307e28ad457
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 16 drive.google.com 17 drive.google.com 18 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2984 chrome.exe 2984 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3068 2984 chrome.exe 29 PID 2984 wrote to memory of 3068 2984 chrome.exe 29 PID 2984 wrote to memory of 3068 2984 chrome.exe 29 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2832 2984 chrome.exe 31 PID 2984 wrote to memory of 2956 2984 chrome.exe 32 PID 2984 wrote to memory of 2956 2984 chrome.exe 32 PID 2984 wrote to memory of 2956 2984 chrome.exe 32 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33 PID 2984 wrote to memory of 2596 2984 chrome.exe 33
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\Untitled document.txt"1⤵PID:2224
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f29758,0x7fef6f29768,0x7fef6f297782⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1380,i,5561422510313480711,7063519380344173737,131072 /prefetch:22⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1380,i,5561422510313480711,7063519380344173737,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1380,i,5561422510313480711,7063519380344173737,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1608 --field-trial-handle=1380,i,5561422510313480711,7063519380344173737,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1380,i,5561422510313480711,7063519380344173737,131072 /prefetch:12⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1160 --field-trial-handle=1380,i,5561422510313480711,7063519380344173737,131072 /prefetch:22⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1268 --field-trial-handle=1380,i,5561422510313480711,7063519380344173737,131072 /prefetch:12⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:1056
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x140317688,0x140317698,0x1403176a83⤵PID:1536
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3996 --field-trial-handle=1380,i,5561422510313480711,7063519380344173737,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3944 --field-trial-handle=1380,i,5561422510313480711,7063519380344173737,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2484 --field-trial-handle=1380,i,5561422510313480711,7063519380344173737,131072 /prefetch:12⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD58e726f705237de526d24bef1bf3a0631
SHA132686afb7c33d0ea65c413d773bdff6a01a59899
SHA256b0caf825c0456cc2e5ffef6801f361e34d5533c3bf55e3af0cb983e39343ba14
SHA512c62c7e9ee6d1c5408811099f5bd5dde0ea20dd5d9d85deec980b3bab8344eefcd55143eda98b995d2418ca20522420f0d2d6c8f18bc0ecb48ad32b4a5e2e8c9c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
689B
MD5e58e07ce54e57835f53f8293f393fd48
SHA19de856c4b194622be4d726b80e0eb2f2cde98747
SHA2561c8f913111e582a674c3c4c94d41ae91820aa349ed11b43eef70c8a04c19616d
SHA5125ba9d006fc285d9b36cdaf33b6fa71576f9823a706d0b36e4ddf5620ef8ec8bdb658e587a7e9b6cceb2047808a26cf7e0558cea5ff1a502e49164bb02b3853d3
-
Filesize
1KB
MD50ed2c6ce3def302748b6d2cfbf8511ef
SHA1e1768fc6cd257e083678349b4dfc98fa5c21112c
SHA256642972659fdcb826c2ab2a9c286d2efe87d2f7c31473a0bffe80229d672e14bf
SHA5121eb0051808aefe2772de2c37d02df1842c15fb5892ca05c2245db04af3875132e1140315ced93a6fae9637b66f223fe1eb59a377046685c92701367261662a20
-
Filesize
5KB
MD5ea927605f7a40db356cd8997ba24933f
SHA18a9ac068522861ed941c67f5f2715407842b5f6a
SHA256718ae6322d53c11433a0f8cd8cdec21c5d4ca158bf49c1bfde2a1468d57f2eb3
SHA512cef7b04943c45104f8c399e684ae836c653ba57555470f8561c5bd9dae4cdbdee43b20fb9b7dd518e24b11ddc8b7501e2ec9d6c097b5df1cf9df6de190a1db19
-
Filesize
5KB
MD56b35e845e00685bf7164d0b8a6690017
SHA1102ca1af1429aa226c69c1a429441602b7d0c0c5
SHA2565de66562f53e7e9c0dc137a7fad189281db2d1c9d91a2b2a2b4ff96f7314be20
SHA512ce8dbdaf4352308d735679703a1bc5b42be42b0ef24106f207498edf5304f84b354969dbdbae1f5546c2d725839b837eb98243fd5ea248983fc2fdc69c2b2da1
-
Filesize
4KB
MD560410a08649eb57dae5e3a68ac99b15f
SHA1a8e95ce95472aa122f3163607b9b60c351a68295
SHA256d87ec2f1742ff6b07d32cb129157f47499273bde687df84a861ac9f8a6b34f38
SHA51220401ca26177a7d79d3b2ceccab78aa762f0408f807cb7988f73914cf2cc00411eb27f658ffbc71dd00487270c03988e2ad1a156e453f69a4c1a32bf23ddd479
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2