Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
160s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/03/2024, 14:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/pankoza2-pl/malwaredatabase-old
Resource
win11-20240221-en
General
-
Target
https://github.com/pankoza2-pl/malwaredatabase-old
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133542937927353039" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 844 chrome.exe 844 chrome.exe 580 chrome.exe 580 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 844 chrome.exe 844 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe Token: SeShutdownPrivilege 844 chrome.exe Token: SeCreatePagefilePrivilege 844 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe 844 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 844 wrote to memory of 3584 844 chrome.exe 78 PID 844 wrote to memory of 3584 844 chrome.exe 78 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 3780 844 chrome.exe 83 PID 844 wrote to memory of 2536 844 chrome.exe 84 PID 844 wrote to memory of 2536 844 chrome.exe 84 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85 PID 844 wrote to memory of 4576 844 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/pankoza2-pl/malwaredatabase-old1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa09469758,0x7ffa09469768,0x7ffa094697782⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1776,i,18291626200888775133,8970277192199860390,131072 /prefetch:22⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1776,i,18291626200888775133,8970277192199860390,131072 /prefetch:82⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2140 --field-trial-handle=1776,i,18291626200888775133,8970277192199860390,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1776,i,18291626200888775133,8970277192199860390,131072 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1776,i,18291626200888775133,8970277192199860390,131072 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1776,i,18291626200888775133,8970277192199860390,131072 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1776,i,18291626200888775133,8970277192199860390,131072 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1776,i,18291626200888775133,8970277192199860390,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:580
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52a0d8efd4a5da47769e659d4c452e32f
SHA1fb1818c6021563526679a0f72582c664aea2d8d8
SHA256bf1ea1a329b8b530bdc1995e61b3aed202c3c0c533b01abcc82a5708834f9736
SHA51296fa0c4bdd029081b9c62f130086df7ffff8cbf91f8644a42b2d28cf632595149128b89c85c121298103968a0ab75a056549d4fc58efdd4454c96e722c13a554
-
Filesize
1KB
MD5cd5a8ab348114e5cfea21897e96f73a4
SHA1c9c8996035fc5af38eb5757caecbeb47f27973d9
SHA256d9b3f53b48970bc02939dc89a3e12293eb836322924d0d29e846e4fc860797ca
SHA5127fb6cb16f77187ddf93ca744c56dbfb9f7cf06aefbe7bd73f125437daa97df8f8685cb09a167fd23a0787685771c54e3dcfad0322a69dc271f578bd254b457aa
-
Filesize
1KB
MD5f829b3c26809a9be230707a275050575
SHA1acc577628314b05a10e3927b37f9792730c7efd0
SHA2569ca21f2ccabfe13216f0e9784b810b8142735ebc90dc0c804433f759b4aee550
SHA51201dea40331cc61987173eec875a3f972b3ea2055fbe2dd41dd6a2d83e0f52ebd5f28bdefd13336b80d39754b207d460072136efa10973b2e62dca6636f43a502
-
Filesize
1KB
MD55c3349b9b0f4a947bf5f1465b591d03f
SHA1531a422578edd0728e981a0f164253ed3289bafa
SHA25666c1157dd1afd653372281149182364c5ab67e6232ef57324a0d4a5eeb3a4c7e
SHA512eba7fb51827d4a8d3d5229fefb57385f26e406c86b4f009f754768ec24c664f05a2ded7470c8afc1dcbfd3c4a93d94111eb41baaa8ebe734ed7694fd26ffc088
-
Filesize
1KB
MD5f5933c3b0b0b7d37a4118fe15e93965b
SHA1ddd960d7b3e14c8ab99ab8582d0f0ea045cf98a0
SHA2566132de580201623e4f4c0390248b63b3a85eb06a08d9b4c041645c3aa0bb31bb
SHA512f385835c3ee972bea66715b3a744c397eb85dd5c2c5cc9259f1b09107ad7320eb8361c956e68961e7ce574491c8a0fc80dad70f1f92ed8ed08cc03db5481ecb4
-
Filesize
1KB
MD56d142641dc320bafd34f9c2325b89254
SHA10a238e2407cc9aeadaf9e1b94b4a9083b8141cbd
SHA25683add0f0cfaca27d9e1d58bd14f8d3ec99a30fcfb1d478cd9f884017507f2b4e
SHA512366a99b529c1723795773d0d4638eb8d123c2e3110ff2d8f0ba2857d2f32d6861377c2d84181befdcf5ff84850e2bef5e743b4551b0f9c941d3c5d2448aa1254
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\d947687f-cfd4-4183-80c1-84a598e66332.tmp
Filesize1KB
MD5873008fce6dc114d86ce0f45abb71254
SHA1a4243cbf8d73b20871e9f7884563f8fe592e43d1
SHA2562c612c770682a272040035b4c38e27a9256e33e289dc579705883d46d154a14f
SHA5127332ebb3e8b3334893e006327340073454595639cc490cfd55562c944b4a14a63842d9b8fb5e8b06553630cff3fbf93c983629e96d383ea2ce9680ba06702703
-
Filesize
6KB
MD50fd8ad831bc9619c92dde0f277114133
SHA12e6f01387bbf617fbf0a7cb40e0c43f57b6db086
SHA256a17e7f3901cc01c01dc9e85ad863e5a5c0fd293de7c1334149d0eb06d41740bd
SHA5120bc1a377d81d989fd33f0c7fd4193d78a4ab854d852fe43ab9ce4bdad2ee90f4923391c2beaa268d6e8e00c6343803d07b4495e38b324b1e47241655bf9594ce
-
Filesize
6KB
MD54cda5ae1f6482283bb80b6f20d84002d
SHA13eebce907d16820467a9daadfb936798fc0c2820
SHA256a78ca4e73a857d888784ea26ce4a22721b385e082ad509cf4110f2f954d7aa21
SHA512bf2ccd6474459b8374ec4f8a95b66cfad71f90f7bb82d4b1337d634025d09d4b54ac2b8fe90b07a039e615a3623cb3552beefbe66a45c8ccb8481be2874bfd22
-
Filesize
6KB
MD599f21552aac900bb9c433611c5b6958c
SHA1c1cf3a62eeb31b30496a527e4e9c3447b2efb788
SHA256ab4aec7f989328160b777c7e243c025555d90992027402bed604d6400ef9c0e2
SHA51236eabfa0d8273ce724a404dc95819ace86d866577fc7611a1cda3c7dccc7fbc8ce66de09ac1dadbc0e91b508f91a60075e0433a59c304184bfda5f41584e7fa0
-
Filesize
130KB
MD5ea86f31906dacae73dd221eb50b69c0c
SHA136c6c76086c0b134fd244674ddec621f2a8d0cbe
SHA2566bfe57b9dcafa669cf15e40e3cf05ad91e9621dfed6aeb95495e25dd6e4a4f98
SHA5125cf0482b9073c10af46d7281a49c029dc0c7bda79da7f7884b8adb48b9e58ebbb6b9c48a9e6e5664c6d6abc9380c196dacc650460b18368cbc20af16dfd556d7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd