Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
07/03/2024, 22:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/NiceAesth/2pacalypse/releases/download/2.4.1/2pacalypse.2.4.1.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://github.com/NiceAesth/2pacalypse/releases/download/2.4.1/2pacalypse.2.4.1.zip
Resource
win10-20240221-en
General
-
Target
https://github.com/NiceAesth/2pacalypse/releases/download/2.4.1/2pacalypse.2.4.1.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543258971701990" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3832 chrome.exe 3832 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3832 chrome.exe 3832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3832 wrote to memory of 2772 3832 chrome.exe 72 PID 3832 wrote to memory of 2772 3832 chrome.exe 72 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 4652 3832 chrome.exe 74 PID 3832 wrote to memory of 600 3832 chrome.exe 75 PID 3832 wrote to memory of 600 3832 chrome.exe 75 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76 PID 3832 wrote to memory of 4296 3832 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/NiceAesth/2pacalypse/releases/download/2.4.1/2pacalypse.2.4.1.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc804a9758,0x7ffc804a9768,0x7ffc804a97782⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1820,i,1289105506438494058,1145074943719212699,131072 /prefetch:22⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1820,i,1289105506438494058,1145074943719212699,131072 /prefetch:82⤵PID:600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1820,i,1289105506438494058,1145074943719212699,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1820,i,1289105506438494058,1145074943719212699,131072 /prefetch:12⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1820,i,1289105506438494058,1145074943719212699,131072 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1820,i,1289105506438494058,1145074943719212699,131072 /prefetch:82⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 --field-trial-handle=1820,i,1289105506438494058,1145074943719212699,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1820,i,1289105506438494058,1145074943719212699,131072 /prefetch:82⤵PID:704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1820,i,1289105506438494058,1145074943719212699,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD5f181b10845631b73db1a4aea35c78dc5
SHA1bb22e9a6bef02fbc63237c8dbe5121981c7531bb
SHA2568449134e2c27181a648d0de1825c8a3dcc92d2c2be6289c8f02d87ebcb892474
SHA512dad9a900694f750adb3c61d1e3432fe208d6e9feb892b0464b43e09b5e1eaeb2ed37bed47a2fbe53b75143f0fbcaccdb542045bb605371273c041f17be4a76a9
-
Filesize
1KB
MD5fbf15c1792f2e5fa422ba5538820f9ba
SHA199827999a62f79db13a11ba1e00450171004fcdd
SHA256ca919176641bb746ab5a470cdd2bda1c9bf5ec39d01c90861315a7b68c24ad5f
SHA512113eef34846fcc23e75460370146cc22406b0b8475662fa191f52df1b614c65e46236181a7fb6e5716c970b84c352fe8963310816ca2953f1f57bf566031e6f1
-
Filesize
1KB
MD5e773d91abe586e6bf43730010a7f5a00
SHA1999d8b5405f4a3722ca89a667184dbdcee4186d9
SHA2567c3d3c2e522ebc1099798c944a77fe3263ec7ac88ec63a8f40b7d3c5ba11c43f
SHA5121296abc60c904b446f2cf8dc8cc7fad0816e4b67923e82cef0d680ed9f8704ac5f63daf5732d0d52ecbd3195f295b7c0b8b436bac15fa4107d92e36be4cf8bbd
-
Filesize
538B
MD5f7cb346eeba555d1b66468efd24a2632
SHA1ffe168f71a48047be22b02170b607a3239e4ade7
SHA256ecb5185bce7ce29d261d82de5814f022939cf2ee2c94d33ec080447efba3afa9
SHA51244a53a71a236185f723e70c8bbed29d250ef8e7461975f40120722d1a84411572f4de56ceed19e205d7639dd7938874ada1a0e03402190177570fd17757b1634
-
Filesize
6KB
MD56b02613cdc614df094b82b612c952b6e
SHA16397385cebde68a52d4c46d360a467cfab6bcc33
SHA256202c4182e696ebb0743aea6cdccdec4de650effa949745479bfb74b34b5f3a80
SHA512fec8eedcfaf50653c6a3a77b627da899dcfb4ae5779a591cf1991f144a23eceb83913b1842621a9fb55e558f7df18c49b00961efd14daf5e3497358a222c10dd
-
Filesize
6KB
MD569839a3439e25d562f662ec3bd5beb79
SHA19309ca2f309fa6652013785b1c3d03a14b2750d7
SHA25698ce868d3945fec66445338c1981cf312635f2df23119bedaf7b25ce80ef7aeb
SHA5129e433f97b2a74d18de3e966af3a2cedbe2d67583c549ef76bddeda6020e8ee5bf39339904dfdc6ad5da1084c45be4c035e85697bb62b4fb0da943d234b9ec9a8
-
Filesize
130KB
MD59f4ff00c192921f57f2f6de7277fd80b
SHA1312593970fb0eb2bca01fba5a64622e6896193a3
SHA256d3a0566d62e5f8fb368904f7d42d4356dff81046875dd25cbe0b13714c1b9d2e
SHA51282c678eecb1501c51f87274e512cca7395bebf46a7850b398ac2a5b3be13f4afa64cbf26b0b69be591a357c9982f84072ddee57a13c054bc278a39f11fd19f04
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd