Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
13/02/2024, 15:44
240213-s6rtbadg29 613/02/2024, 14:50
240213-r71xyadc69 613/02/2024, 14:44
240213-r4jt9adc33 613/02/2024, 14:41
240213-r2we9scb21 613/02/2024, 14:40
240213-r17f5scb2t 1Analysis
-
max time kernel
32s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
Untitled document.txt
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Untitled document.txt
Resource
win10v2004-20231215-en
General
-
Target
Untitled document.txt
-
Size
173B
-
MD5
f388b88f4839029e5198fe8e2de36b36
-
SHA1
305c1aaf8d44d9cb4f74cc67c1bbf084aca27acd
-
SHA256
2c433ffb2a21830ae7f7e01afdaf08b9f015492355dacfa51fb139bf4a088f1c
-
SHA512
38e012cb4d4a65691234746bd06f01ef9835f75ea648bc3b0e83d32c220784efede34f44007171be79d87a27763f8d38383bf3e252c8507c4f744307e28ad457
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 12 drive.google.com 13 drive.google.com 14 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2828 chrome.exe 2828 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe Token: SeShutdownPrivilege 2828 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2012 2828 chrome.exe 29 PID 2828 wrote to memory of 2012 2828 chrome.exe 29 PID 2828 wrote to memory of 2012 2828 chrome.exe 29 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2648 2828 chrome.exe 31 PID 2828 wrote to memory of 2788 2828 chrome.exe 32 PID 2828 wrote to memory of 2788 2828 chrome.exe 32 PID 2828 wrote to memory of 2788 2828 chrome.exe 32 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33 PID 2828 wrote to memory of 2672 2828 chrome.exe 33
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\Untitled document.txt"1⤵PID:852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6aa9758,0x7fef6aa9768,0x7fef6aa97782⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1272,i,16927527394930048249,2788693189255205292,131072 /prefetch:22⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1272,i,16927527394930048249,2788693189255205292,131072 /prefetch:82⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1272,i,16927527394930048249,2788693189255205292,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2320 --field-trial-handle=1272,i,16927527394930048249,2788693189255205292,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2356 --field-trial-handle=1272,i,16927527394930048249,2788693189255205292,131072 /prefetch:12⤵PID:108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1316 --field-trial-handle=1272,i,16927527394930048249,2788693189255205292,131072 /prefetch:22⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3252 --field-trial-handle=1272,i,16927527394930048249,2788693189255205292,131072 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3464 --field-trial-handle=1272,i,16927527394930048249,2788693189255205292,131072 /prefetch:12⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2620 --field-trial-handle=1272,i,16927527394930048249,2788693189255205292,131072 /prefetch:12⤵PID:320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 --field-trial-handle=1272,i,16927527394930048249,2788693189255205292,131072 /prefetch:82⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD58e726f705237de526d24bef1bf3a0631
SHA132686afb7c33d0ea65c413d773bdff6a01a59899
SHA256b0caf825c0456cc2e5ffef6801f361e34d5533c3bf55e3af0cb983e39343ba14
SHA512c62c7e9ee6d1c5408811099f5bd5dde0ea20dd5d9d85deec980b3bab8344eefcd55143eda98b995d2418ca20522420f0d2d6c8f18bc0ecb48ad32b4a5e2e8c9c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5bfbb83abd263f8a471f99f881ee8d486
SHA1e09abd8d8cd39ab70b8ae71b6b9ea5d7859c3054
SHA256c9d73adccb3ac6c698f09f3e0893d658fa534a5888116a6cce73cf01ce542d71
SHA5127cc3484d02b3d429ccd166de473b60d500e5d8ec1dbf16c327a0f5104fdad8f74780219f1708fca89176d947e106bd770adcb1ac499fd68fb9d2a9c7aee81462
-
Filesize
4KB
MD56c2905a084b4393a491c79c622b7c47a
SHA11fd12fce7bf837288f2eb93551d8a1bb7493a11e
SHA25652f36b2b1c9498a2f8b5a3d9ef665a14428067c6a1669875a95b9267eb3d2e2e
SHA512f3b292d07446acb879ace775c9f222b3468c43c774cce76ec12dec31ff61481cb9bb12dddc2e5a0a24010da5fea60ee70e998155fd4dd6c16b05415709a05cce
-
Filesize
4KB
MD54ac6e46f234a2bcf3e473d79500cee4a
SHA1b930150a1b48a542896786b660e1754a4a03d7cb
SHA25655b439dc4b6f6eb3844e236a076f7261d3a3723c6566c6c6a50d1222705f4a4d
SHA512cd7a5c4f460cab9b26b4b920705520f1054587a551522d6dec540a99d7973700e1c322a5b78a53544bc6a01a583c0a83d18985344fd549dc066b02c395e93ed6
-
Filesize
5KB
MD5d5a431485c4fe280f0b516f6682a46cf
SHA1671e98b2012c1d60113b83b34f998213bce55b09
SHA256dc85d0aad337a3a24d62ca5567283202b16ef147e871faff35dab6bf0fbe7d60
SHA51204f8dbc3da5ebb8b74c516192c8b2dc193e37e2fd9b932f15b42e7001368be94883dc078198cae440ff0c5b1ae5471f8e5a7abb66a9e0b1f6b103ba3ec4b4234
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2