Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
431s -
max time network
1686s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
a (2).htm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a (2).htm
Resource
win10v2004-20240226-en
General
-
Target
a (2).htm
-
Size
1KB
-
MD5
fa29916f652602f11362858fc58ee874
-
SHA1
3e79b7c48adf7dbe39c935633d442d4826730344
-
SHA256
923ae78ef3ace374cf0d3674376943b0cdf1747b46de74dc5c14fda16df936fa
-
SHA512
902f2b5c73920a4610f898804cc53592de6bc62979ee092b0c15121cfd632c1c1b1d85ddaa3e2275d7e652fbb0a6f7d977f77456f1fcbbd3007861ed49781d6b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2476 wrote to memory of 3016 2476 chrome.exe 28 PID 2476 wrote to memory of 3016 2476 chrome.exe 28 PID 2476 wrote to memory of 3016 2476 chrome.exe 28 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2572 2476 chrome.exe 30 PID 2476 wrote to memory of 2420 2476 chrome.exe 31 PID 2476 wrote to memory of 2420 2476 chrome.exe 31 PID 2476 wrote to memory of 2420 2476 chrome.exe 31 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32 PID 2476 wrote to memory of 2156 2476 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\a (2).htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6be9758,0x7fef6be9768,0x7fef6be97782⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1356,i,2422509998676467496,8060291237507600929,131072 /prefetch:22⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1356,i,2422509998676467496,8060291237507600929,131072 /prefetch:82⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1356,i,2422509998676467496,8060291237507600929,131072 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2228 --field-trial-handle=1356,i,2422509998676467496,8060291237507600929,131072 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2236 --field-trial-handle=1356,i,2422509998676467496,8060291237507600929,131072 /prefetch:12⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2776 --field-trial-handle=1356,i,2422509998676467496,8060291237507600929,131072 /prefetch:22⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2208 --field-trial-handle=1356,i,2422509998676467496,8060291237507600929,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2720 --field-trial-handle=1356,i,2422509998676467496,8060291237507600929,131072 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3876 --field-trial-handle=1356,i,2422509998676467496,8060291237507600929,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\37d66836-d2ce-403c-88f3-2120d8c041d6.tmp
Filesize4KB
MD5f6a90ac8e6e88ec5f0133b6c9e57faf5
SHA1bd015779e660217d519cc01d94e2725c7d6ab53a
SHA256e790b0657caeb0b56df2ef8a8224f66de3f35c4de0dca9fb7d193d342d16c5a7
SHA512db17379f6dc64386fff5e4e54aada89f97728534400b563a93b970f67264269e2f16d8f1f81f36edbfb11ffc42fc720adeb668b48b84602dfd629fc830aca62a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD58196cb796d583eff72a0369c8e62fe55
SHA1f5324d810c84b5780417f1f89394625b64b2b26e
SHA2563289a956999e5250cf2c5a086998a5262745d6150cdfae38d54d224146a83382
SHA51265835e534cd6302e77ff8c69004a5c14e0de1d74e18151b780cd313c73643e309c19724b1c57b7e9a0b31462a159723e150d7c4614dd59287546c0850a40aec5
-
Filesize
1014B
MD532f0a2bbad5148ceeb81897562f7d260
SHA17a2bf62191ec18a875900e3359b06eafba921757
SHA2562804bff37eb25e011416a32b62fd31e9c58db26750af0c280d2ea04c59a622f4
SHA51205fbb04ba0800dc567e396699e1f425c9ead447ea6b53c316e3d5f15920bd2c703b29fb159a6e3e255db2ef7099cac6da078b49786386382f9718fc461609109
-
Filesize
1014B
MD59d2513103fc5e7ccc2c075eadb960db4
SHA15f826c6d79794769f2b6597a5535bcd9425263a6
SHA2564fe84b00cd83ae6a6b3ff7b1aab07793db828e1ee3c7fef6442a893bc4cf606e
SHA51243f830bcdfc81ff552e968ab6aa68a94a8153bd4429e3a8f3c9dfb4f01aa018924bcc4b9afaf8b5b7d2e3c9046c96b6dd89b6e64e50359f865134901a8486ce2
-
Filesize
1014B
MD5e79dbeb1db53b65c53579a2e33ca1729
SHA1e4aa27bf498e27a547e0a48d41c20f63b46823f0
SHA25614d4c348ec0af4efeb8466e169db3323714d505fd61136d1312d1049a1431b29
SHA5127c2508f0769761dcef6809b881a7042ce1cca938b055e9164be0feb004a7f98f65dd9d84522434b92b58aa182cb2a9d41f9f83e2aa907aa1ec94f65e7afde495
-
Filesize
1014B
MD5891d1a4a499d46e312ac263fa65a2f9a
SHA136c8c2786ba8f83d5647037a30f2d1369f1aedf3
SHA256a0e7c0bf742e38b3aa39efc01517cc61fdc0df12d6c6af4ee61af5d3440ab419
SHA512c51ccd4771b669a21c8e7a4550cf972dfce22756ed5de0d26336ec2822e489f87768016029ecca90b0e51fbf213ff6a870e93fb8e5859fdf6e4d15e9f75ce259
-
Filesize
4KB
MD5015e5d59cf720ef51640516c8fd930c5
SHA1b673bddfecb2831877263007c401127002092a99
SHA2564c85d2c754b3fed680decf4e0efb7415e330fcf4b0b62614965624c48cf922ff
SHA51282dcc2a0a9eac3f1d8f313649089d2796266d0a1c8a2a262dd7f32638177f2000baa7e2503b031cbe1bc1e40730c1bad9810e023bdf07b4fffb9eb5ccdf8b938
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63