Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
284s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 23:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/u0fjvglvlvtjwu0/ultra_logger.exe/file
Resource
win10v2004-20231215-en
General
-
Target
https://www.mediafire.com/file/u0fjvglvlvtjwu0/ultra_logger.exe/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528573193142598" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2372 chrome.exe 2372 chrome.exe 4748 chrome.exe 4748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2372 chrome.exe 2372 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 440 2372 chrome.exe 84 PID 2372 wrote to memory of 440 2372 chrome.exe 84 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 1460 2372 chrome.exe 87 PID 2372 wrote to memory of 2920 2372 chrome.exe 88 PID 2372 wrote to memory of 2920 2372 chrome.exe 88 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89 PID 2372 wrote to memory of 1756 2372 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/file/u0fjvglvlvtjwu0/ultra_logger.exe/file1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81f899758,0x7ff81f899768,0x7ff81f8997782⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1868,i,11106391102355180132,12162370708428302882,131072 /prefetch:22⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1868,i,11106391102355180132,12162370708428302882,131072 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1868,i,11106391102355180132,12162370708428302882,131072 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1868,i,11106391102355180132,12162370708428302882,131072 /prefetch:12⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1868,i,11106391102355180132,12162370708428302882,131072 /prefetch:12⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 --field-trial-handle=1868,i,11106391102355180132,12162370708428302882,131072 /prefetch:82⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1868,i,11106391102355180132,12162370708428302882,131072 /prefetch:82⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1032 --field-trial-handle=1868,i,11106391102355180132,12162370708428302882,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD54fb910d00da1c3e24d6290099351c95f
SHA139ffad6a7857016afc9a52d8cf869db5428e92c4
SHA25602196662ea89d1aeb6fcee4ba8df5c0be9735f656ae1991b8708d36d37998819
SHA5122440ca21bd874e5ca6aa1b97269d96d1926b4a3eac31d8b7ac400922b7a7b3c8e9964ce3ec06dde774a0aacaee710bb5052d09a4c549a8a49c8ba63544b6f29a
-
Filesize
2KB
MD5f139251954212c207d9eac7d825429a5
SHA1d396fa00b9377daa14aecb531e847da316fa8bab
SHA25662be2416e3051adb41723f51b291a8afa59b742b1dc2e50890e118d5421eb140
SHA5126155cf9ae3dfa467e96682ee60ad55cc8f1a011b01e599cf39958b36d68e505cc989a95091a14d5598b29623ef561d081f23ba3f8192f5b28d97921a6577ee70
-
Filesize
539B
MD5a96e2846d66a3708d8d340e2cb14efcb
SHA13cdd0db2d11441f1ebc1f58e395d854eef3c0543
SHA256f421b8850bb9f85bc6e0060c4ce12ef4471ac9a91cd53f13e5238d6945a9fc6a
SHA512da7593d97912a408bd2df35139b4062f3ba8941d76e4576ddf25ccb81220c08e5cf8cb338c3f20eb74764c6cf4fb6b74426dda843b8525f9307bf089680c65fc
-
Filesize
6KB
MD5f9b6ffdabc1c2c229e685d69d173fe04
SHA183ab92fb5eeaf89823f85fe0198c9bac99d3301b
SHA2564a7e98df0044955c1aeddc52e406f7798a3372f9a427ffa2d8809d0c65433f0e
SHA51282c11f4e89693d7c5435fc57b89f4fae0010ddc3472cfe9526dd0f66cfcdf93c8ab2640a914adf76f7857b0ad1377649d74aeae1f207ee41c0fc8082e977d1c8
-
Filesize
6KB
MD578c049abd40063c4ae4c2d741c4dbda5
SHA18d8f905ccdf120377f151391f0e7d4ad4c72c879
SHA256e554e2342355f514d15ef0f032e91cce09a18e75abc0d169a786772627605287
SHA512b4e57f6dfcf7196fed1f09b2fd78eef51b89408c9d751b8e129bd359040434792bb20086602f33c66349bc21b19cd1b98f8a75eb65f9190fc8bc83afae56c374
-
Filesize
114KB
MD5af43e84e74354399458bec14bd5d1d77
SHA19381a6c4ad1c5bb1caa1d8969881663a0fffb089
SHA2567c3ca0b2132d7c1865b306a50df86fbc0d6cb65ea674af79f6fec8d97fc6235c
SHA512fa90edce672c8624d5e5bb4838312f9d42cad44d5e624128b45b7346570083cbe5306f3afc733aa88fff24546592c9208978a8e1ab9837765d2bbc41b489a020
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd