Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
64s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 05:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1211211541236416582/1216721579266801694/client0.rar?ex=66016b46&is=65eef646&hm=47515cbbdd9324a5cfbfdd558bbcae727ec299111c3be62b49bb2f9037180e0a&
Resource
win10v2004-20240226-en
General
-
Target
https://cdn.discordapp.com/attachments/1211211541236416582/1216721579266801694/client0.rar?ex=66016b46&is=65eef646&hm=47515cbbdd9324a5cfbfdd558bbcae727ec299111c3be62b49bb2f9037180e0a&
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4108 client0.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546961689963859" chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3840 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeRestorePrivilege 3840 7zFM.exe Token: 35 3840 7zFM.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeSecurityPrivilege 3840 7zFM.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 3840 7zFM.exe 3840 7zFM.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4700 wrote to memory of 2368 4700 chrome.exe 88 PID 4700 wrote to memory of 2368 4700 chrome.exe 88 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2816 4700 chrome.exe 91 PID 4700 wrote to memory of 2328 4700 chrome.exe 92 PID 4700 wrote to memory of 2328 4700 chrome.exe 92 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93 PID 4700 wrote to memory of 4316 4700 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1211211541236416582/1216721579266801694/client0.rar?ex=66016b46&is=65eef646&hm=47515cbbdd9324a5cfbfdd558bbcae727ec299111c3be62b49bb2f9037180e0a&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff27d19758,0x7fff27d19768,0x7fff27d197782⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1868,i,2262951730666174358,4449540777075137794,131072 /prefetch:22⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1868,i,2262951730666174358,4449540777075137794,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1868,i,2262951730666174358,4449540777075137794,131072 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1868,i,2262951730666174358,4449540777075137794,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1868,i,2262951730666174358,4449540777075137794,131072 /prefetch:12⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1868,i,2262951730666174358,4449540777075137794,131072 /prefetch:82⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 --field-trial-handle=1868,i,2262951730666174358,4449540777075137794,131072 /prefetch:82⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1868,i,2262951730666174358,4449540777075137794,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\client0.rar"2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3840
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4400
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1576
-
C:\Users\Admin\Downloads\client0.exe"C:\Users\Admin\Downloads\client0.exe"1⤵
- Executes dropped EXE
PID:4108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD53c6818df0d0e44d9454642da9f2d0e16
SHA1a44b0780346837b716fdf493bf32833f8f38a918
SHA256ee6f36586e03d5ce79dcd95a7a25aaa62742e34b6bf8f3a97f53da9b70f0964b
SHA5129d724338f3c371aefd42884a3ed5a9a178de744f36df0bf071834f38dd5f4d83dbcae6496223c952340c467e378f7609ae01eda2af95065ef8fedf5a1b26d0ab
-
Filesize
6KB
MD551afa68a529e78afab186458c5147a2a
SHA11b9b8d13ca6f38b96b20627f07fe33b94f8ed9cf
SHA256fd43163baec4c666ebcdeeb2040b1147d80c986dd6b18508721b474fd0551418
SHA512a006c5640e02adf6bf05541969b5aa2c2566f5bb5f8d0d51156ed216aa1e8a57a0d620a493fe942d5deee71ed89a614889de42cee960ed1d01399fb731e77735
-
Filesize
128KB
MD5a292b5f8c6e6d35bee01b14d1fca1642
SHA1ac4e145093205a767d105f3b55678338e476519f
SHA2564006345dd217cabfa664a1d3d67a58c9046f34d0ea16a1704c8a5d6141d4394e
SHA512ab31fe7af9d2e7d5c582355382335ae56ca79457f89e7d9bc654d7dece5b5daa6a5d579761c14405bc45828bb858ecd6832f9c35fcc2979a8dba1a22787a4065
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
73KB
MD563a7938c388a2a6684a200910c69ae53
SHA17bae859e973b240322224153b44910453c620084
SHA25649890e703a8f2a540c9e43b52666aadfe5806f190c4b5da81a28dca13a980f68
SHA512cf637abbaa85ac5a4a7782d57291d6644337466d7b6331c2fe16dde18116b8bdaf9f1ce21e21f3a5a86ce9861a05edf0abf22db0d78a979358f4cc7b20b7a5ec
-
Filesize
15KB
MD5be8c17550b073ab66e2f07bd47d5ce0c
SHA12ed5dfdeacb795632c77bc17cd4931ecb50d9abe
SHA25662fe29e8afde9b4d8d74c2376acd26bb9e0c44934ef2f3e74034c9d5c93e63d5
SHA512ce40307718e06c528b00f529f6b6b1447927034402d2620cc30d3675fe2720f0345e04495ddf57aeed23010950f9d6dc72f5f6b36dac46b44b71ca129b70b392