Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
Cross Scene Final.glb
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Cross Scene Final.glb
Resource
win10v2004-20240226-en
General
-
Target
Cross Scene Final.glb
-
Size
70.0MB
-
MD5
787e8040ca6fe9153af36077869c76a3
-
SHA1
9784cec146ce2026e2c1fd6bb6122b0ee4213980
-
SHA256
e6c58352096cf1056402dafd1b7cd91cd97dbaa9c0d5564357a8cff51bf859b6
-
SHA512
7425b01f30c84d73dee11d2856e8e164cc317f79562031a1901cca6e384ab78c38aba06011139fd0590ddc1839544a597fc420270c33634816d2c825a34f7741
-
SSDEEP
3::
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543121243968042" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 624 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3328 vlc.exe 1892 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4384 OpenWith.exe 3328 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe 3328 vlc.exe -
Suspicious use of SetWindowsHookEx 37 IoCs
pid Process 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 4384 OpenWith.exe 3328 vlc.exe 1892 POWERPNT.EXE 1892 POWERPNT.EXE 1892 POWERPNT.EXE 1892 POWERPNT.EXE 1892 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 4336 1664 chrome.exe 105 PID 1664 wrote to memory of 4336 1664 chrome.exe 105 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 2424 1664 chrome.exe 106 PID 1664 wrote to memory of 1544 1664 chrome.exe 107 PID 1664 wrote to memory of 1544 1664 chrome.exe 107 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 PID 1664 wrote to memory of 1188 1664 chrome.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Cross Scene Final.glb"1⤵
- Modifies registry class
PID:1108
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4384
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd0069758,0x7ffcd0069768,0x7ffcd00697782⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1904,i,6067220916948705779,17789293406172331638,131072 /prefetch:22⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1904,i,6067220916948705779,17789293406172331638,131072 /prefetch:82⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1904,i,6067220916948705779,17789293406172331638,131072 /prefetch:82⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1904,i,6067220916948705779,17789293406172331638,131072 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1904,i,6067220916948705779,17789293406172331638,131072 /prefetch:12⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4588 --field-trial-handle=1904,i,6067220916948705779,17789293406172331638,131072 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1904,i,6067220916948705779,17789293406172331638,131072 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5236 --field-trial-handle=1904,i,6067220916948705779,17789293406172331638,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1904,i,6067220916948705779,17789293406172331638,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1080
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RevokeFind.txt1⤵
- Opens file in notepad (likely ransom note)
PID:624
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnblockRestore.asx"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3328
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\Desktop\MergeBackup.pptx" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\2c0f2c2c-4f46-4a1e-b814-a7d5ac7011c6.tmp
Filesize1KB
MD52a392478192992e2c8a0ff7ae763d4c2
SHA14df6d7f1f05a54e436b37b541577f11a08cf031d
SHA25605284c21d09d393b89b7ef0f53f3cf005b065b98d7aeb96386b102197f8bda6d
SHA5120be369a94ee02125e858b43e621bf06e26930d080e648cd5c39c4aadd2ae2d9b8d9b1a34c7a87eb2c74389f3af418ebfbdb30967852a4dbceb033a9a8bb58ac1
-
Filesize
371B
MD5030cd48611600eee37882a91edca8419
SHA1f0e5b5f00ad9cf14ff624c4d88557bc3c90f54a8
SHA256d0ec7c1b98b61e8d74dd11bd833a7024979b77c9859a0dddd0e7972ee69b7024
SHA512f546a23c3c4bc87f60f2ab19d3168d6417c7389f55e917cfa4d55de1bf124405b245987a8e9ab94bc20e9e3d18e13d09902c1f0fc0488bc048af26e9a8600a78
-
Filesize
6KB
MD55dbb185c26d62beb00e3e3a3806fbff1
SHA1ac6d84546d23fad471f917c128a1ae6710ba521c
SHA256a858f78122d34bad4b0e46df52f421081f17ce8b2a1f50df385eb3e54b410a0d
SHA5129a45ece7d3b58453beb6a1e9402b4a93f85d2f829618d7be842ff344c766600dd6e92e6bb2152b23b48a4e801a67a87fdcb344991bf15cf9595fb9e531e61b71
-
Filesize
15KB
MD5d08329964d2d1ded151580c9025f6866
SHA1ae4ab97427d9f155f9417b901f32bad1f94dcb28
SHA256e8e11c99e7a139b8b05d7cfa30ee1080bd9a9ad7a69054053bb778a0fa3fe1bb
SHA512a81e032feea7ff88cfe6ca73c8310ef8cef8cd6a63a66bbc41b395c9601926e7c476df30d83f544c246a366b14354944aa9c15878bf0c21e80821bcbcef10cb5
-
Filesize
256KB
MD58a97e957b5868c07a77caa6135e32b1b
SHA16619bcad5e4dacd8ab3e902922f8a28286f37ccd
SHA2568a848409aa3f9c5b12459fc89fb718e43275d8984c5c8583c30b7ac1c0af96ae
SHA51223047f3d6b3b1dce2977995210473b9ed57be3987a3bdfe2f96f6f34fe32bd7cbde7c88064a65e6d6f41fd0b5e2f5b031b3ba28787e29a7f5bd1f91593658e61
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd