Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/04/2024, 03:27
240406-dzvt3ahg7t 806/04/2024, 03:23
240406-dxx7eahg4z 606/04/2024, 02:55
240406-det22ahe3w 606/04/2024, 02:53
240406-dddnnaab24 606/04/2024, 02:31
240406-cz4arshh27 606/04/2024, 02:28
240406-cyek1shg92 6Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/04/2024, 02:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Netaa33/KRNL-Executor
Resource
win11-20240221-en
General
-
Target
https://github.com/Netaa33/KRNL-Executor
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 camo.githubusercontent.com 17 camo.githubusercontent.com 18 camo.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133568456149139097" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings chrome.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Installer.zip:Zone.Identifier chrome.exe File created C:\ProgramData\OWYsODIsODQsYTEsYTcsODUsOGMsOTYsNmIsN2Ms\lua51.dll\:Zone.Identifier:$DATA compiler.exe File created C:\ProgramData\OWYsODIsODQsYTEsYTcsODUsOGMsOTYsNmIsN2Ms\Nzgy.exe\:Zone.Identifier:$DATA compiler.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1676 1608 chrome.exe 76 PID 1608 wrote to memory of 1676 1608 chrome.exe 76 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 2372 1608 chrome.exe 78 PID 1608 wrote to memory of 856 1608 chrome.exe 79 PID 1608 wrote to memory of 856 1608 chrome.exe 79 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80 PID 1608 wrote to memory of 1972 1608 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Netaa33/KRNL-Executor1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbce489758,0x7ffbce489768,0x7ffbce4897782⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1848,i,6254478955531747911,18073770871308763604,131072 /prefetch:22⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1848,i,6254478955531747911,18073770871308763604,131072 /prefetch:82⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1848,i,6254478955531747911,18073770871308763604,131072 /prefetch:82⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1848,i,6254478955531747911,18073770871308763604,131072 /prefetch:12⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1848,i,6254478955531747911,18073770871308763604,131072 /prefetch:12⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1848,i,6254478955531747911,18073770871308763604,131072 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=1848,i,6254478955531747911,18073770871308763604,131072 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 --field-trial-handle=1848,i,6254478955531747911,18073770871308763604,131072 /prefetch:82⤵
- NTFS ADS
PID:616
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:472
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Installer\Installer.bat" "1⤵PID:4928
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:1844
-
-
C:\Users\Admin\Downloads\Installer\compiler.execompiler.exe config2⤵
- NTFS ADS
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54602f5cf490f753bac10681734b44d6e
SHA14491b5b1eb13b1799c53b542bd340bb9d962dbaa
SHA256169be9a97c34050bb9371db0dcccb0ca3d42c4edebe5f95621af7d89adffbbf3
SHA51225ccbd8458120b0f8e7fd43ec6b1e3502272a4ec31cadd19e6d4934e6b50900f6b6b9a52a0c86a64e352a5e7698f2d25ada7e1a8e7b2c5b12ef5591f4871c933
-
Filesize
1KB
MD5d42fdce2eecd19a890ec5f0b25804aa8
SHA12e677d93f5bca83fbb26b330c2f0699a972897ce
SHA2567da70998f6ada4bbe4dac2e7b5622da1a05f3f004ad6f447c87dad262cd87fd6
SHA512ea87cd914d8c715ae25df673139e03c5686d3fdd31f6e482e8b7ce754f653177f022f39617430b38b03c6cc1eba83ab365a0460c36c9ecc2144eec6ea2191d62
-
Filesize
1KB
MD5a2087310b52a51d51c015c716c2b192f
SHA10a3be5ce548b6114bb8ef3d3fa009d21f9e59b42
SHA256cae2c40dff3d7c049c9e6b51758e9d247742522e5c035016d3af62c9a59c7ac5
SHA5125fde0db6bc95f354467ae90ed609e82b4fcdffd6bfaf382c9f0f5393f74dd6695be4f41ad59c45ae8cfa781df356242f29d38f6aa7601a6468e208eb8a947e71
-
Filesize
1KB
MD5376b92f13ab666a432b555da2a57c9fc
SHA118f94930e3714e7f6049b8503761b888f45d0782
SHA256af102287848cf99aec2ed97a9db377ae80aaf91af669d419a29994bc067e0227
SHA5128139e5352e0a3a6b0344c7bfd98d127542390e7bce5bb5edeeed9e0c21d2e920e065d515cce2cb71e29a2ec25845964e96649d82b71233b8d2b893d0583b3d9b
-
Filesize
6KB
MD53973330fe63fc2d838c227147aa4fb24
SHA1556e12fa417ea26e834323893a6f3acdc967bace
SHA25660a208b619352f1b0796c7847f715fa72a91b0e81c3d09b4dd8e9cdc6d7ffce0
SHA512476bc7abb3e373eda957d6ee6b900df3f7e434095722bce92cb81509ac427284b0380f44b5e68c62ddce0756b7b73c6fdb8bf98192577bbc1194002a44547be2
-
Filesize
6KB
MD5243479f128da5b9a16e349604a4da0b3
SHA17bfbc4901535ec09315dfe9f2c10ce0f4f4ff4c3
SHA25677c1bc11c95fa64c75ec7847880dc237426e425fdd64a968f27950f3328ffd13
SHA51259f288b1e08d6a66326f5d408ffecd7632956b8aeb843c9de36d03a8d2b2eb5d0a37bbd69620fa6d75a3501d299523a6ffab8bb311e3f6df9f61db606e01a7a6
-
Filesize
130KB
MD55969f57ada0c632c1bccd3b172202654
SHA1fc752848d55a952196ed9f5431c52a976484285c
SHA25687bca3d20080bb396299e836d636bf74099f17603213c5aa4313d282def1eae1
SHA512e561c0244fe71fca31f05bd9468acf3dd693df27832ab6f0ecd02f71521909bb24758cee9f8eede4c7c7d9c5cfdbe4f264060fcdbb88182ed55d29027ac62601
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
476KB
MD59bda27c2159a36fadbbb4b073eb58363
SHA1e1c38a62e2f7efc3ce4e0a3c81375f8fbfe36826
SHA2562eb959e06c121bd6ea9e5cc6edb280aca21344837f653660f5c97b46efb97793
SHA512195ea7bcbc412a2ca57c5bfb1090f7c378deb77625efd7ac590cd0150ee39fa1a85dde264f270e1d9621562ab16db0366a019d5ecc6340b447baafa2844fbfbd
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98