Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
39s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/02/2024, 15:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1NlFZD6Zc-q9nl9NWQ256b02s6ZtmQw_e/view?usp=drive_web
Resource
win11-20240214-en
General
-
Target
https://drive.google.com/file/d/1NlFZD6Zc-q9nl9NWQ256b02s6ZtmQw_e/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 3 drive.google.com 4 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133529183849063685" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 3568 3880 chrome.exe 77 PID 3880 wrote to memory of 3568 3880 chrome.exe 77 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4196 3880 chrome.exe 79 PID 3880 wrote to memory of 4248 3880 chrome.exe 81 PID 3880 wrote to memory of 4248 3880 chrome.exe 81 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80 PID 3880 wrote to memory of 3944 3880 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1NlFZD6Zc-q9nl9NWQ256b02s6ZtmQw_e/view?usp=drive_web1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb9d6c9758,0x7ffb9d6c9768,0x7ffb9d6c97782⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1812,i,2340986959837978569,7865821211185098185,131072 /prefetch:22⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,2340986959837978569,7865821211185098185,131072 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1812,i,2340986959837978569,7865821211185098185,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1812,i,2340986959837978569,7865821211185098185,131072 /prefetch:12⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1812,i,2340986959837978569,7865821211185098185,131072 /prefetch:12⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1812,i,2340986959837978569,7865821211185098185,131072 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1812,i,2340986959837978569,7865821211185098185,131072 /prefetch:82⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1812,i,2340986959837978569,7865821211185098185,131072 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5fc427d264e31b367f5dcdb2069a1682b
SHA1b5187cbd9fa0f63b2c9503e9078a84e746549a06
SHA256b855282dfdd44cb3f6dd1de10598516f27faaa77196ee8a7448aa5daa76e2693
SHA512f4e44e1b4b76b9e6424dd85d895aa6f5e8d49f87f7574e62e7e8a00247f38ab3caa98d8948b2ae8e32daec350a7205dd245984e8ee6af296a22c21610db6975f
-
Filesize
1KB
MD52c184ec39b9efdcd251677361195f955
SHA10003c7cdf3d95899ad217d4a8e24d34a3079913b
SHA256db1fd1a2897c797dc496e3379b1a3c136db26139cf2ea88e83b0142ad86c411f
SHA51286c550b703bdeb96bb4a0817c35690563c4982b8a872ac0ed6e8a0ce42d308b57d615d85f57f524816b309bbdce954ff9060ddeb06c33141e7ab20fd1a9a8af5
-
Filesize
6KB
MD5b520fa357911968a807a388120d5c089
SHA1b9bc652286226a5042e27521a734b0ee8d404c5d
SHA2564909d7942584224f5cd77d116f0dc07d294f3304e0b2653e56fb1ed7ac9ebe06
SHA51213183b7e4241cf1afd614dc2e222fd9b8e52ce67bf3eb50d7f654362fd831e4ab613278d5dd2f63729f2ef96bbfa3d057234c65a768c756810336ecde15c36e4
-
Filesize
6KB
MD5d9b7c4ee816e7c8bc0e12a3147bf4c83
SHA1b096af62b2cc2cd8df57af349edfb68524028426
SHA256d4637afe2cd9fd515c992c999bc18d8a4f0eaf0df6e905d20a87cb8e31c280a1
SHA5124bd33c4e331d48e5db096d0f571238b11a2d28341c6c2a118104ffccaf1004c45af1e5308ceea798c4cb7860dcf7f9070627d8b6f658c7f22529aea64cf6c871
-
Filesize
129KB
MD586dfe97f2497f4254a8f264358fbe39e
SHA133682a34d8f9ff9c0736cfc5450e15f30853d5cc
SHA25671b3a0a5bc1ddc55aab8456d8357ac69d746439d3a99af6243c7ac7d0f2ebbc1
SHA512e7b26876aa4eaa820899c82aeaaed95cd04899c5e3a448b0e23b1abbd1c9fcb330bf06ef2c3f299af24f232d35b10e547f072f6c0313d0e56c8be6e727b1755c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd