Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/04/2024, 03:27
240406-dzvt3ahg7t 806/04/2024, 03:23
240406-dxx7eahg4z 606/04/2024, 02:55
240406-det22ahe3w 606/04/2024, 02:53
240406-dddnnaab24 606/04/2024, 02:31
240406-cz4arshh27 606/04/2024, 02:28
240406-cyek1shg92 6Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/04/2024, 03:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Netaa33/KRNL-Executor
Resource
win11-20240221-en
General
-
Target
https://github.com/Netaa33/KRNL-Executor
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 8 camo.githubusercontent.com 20 camo.githubusercontent.com 21 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133568474841274785" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1676 chrome.exe 1676 chrome.exe 1480 chrome.exe 1480 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1676 chrome.exe 1676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeCreatePagefilePrivilege 1676 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1676 wrote to memory of 232 1676 chrome.exe 78 PID 1676 wrote to memory of 232 1676 chrome.exe 78 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 4840 1676 chrome.exe 80 PID 1676 wrote to memory of 3480 1676 chrome.exe 81 PID 1676 wrote to memory of 3480 1676 chrome.exe 81 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82 PID 1676 wrote to memory of 1100 1676 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Netaa33/KRNL-Executor1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff912129758,0x7ff912129768,0x7ff9121297782⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1580 --field-trial-handle=1812,i,5393627663255052258,1744694728967035436,131072 /prefetch:22⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1812,i,5393627663255052258,1744694728967035436,131072 /prefetch:82⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 --field-trial-handle=1812,i,5393627663255052258,1744694728967035436,131072 /prefetch:82⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1812,i,5393627663255052258,1744694728967035436,131072 /prefetch:12⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1812,i,5393627663255052258,1744694728967035436,131072 /prefetch:12⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1812,i,5393627663255052258,1744694728967035436,131072 /prefetch:82⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1812,i,5393627663255052258,1744694728967035436,131072 /prefetch:82⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3840 --field-trial-handle=1812,i,5393627663255052258,1744694728967035436,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:4924
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e900e77552385863cfd7b2f85946d1d0
SHA1c0aac23d77b251108cb9e5025fb15cd888cec83d
SHA25603918b4b6a147864cf7c5e1a88063476a194c910a302bcb90111220ce3aef73f
SHA512026973de20881e0e436e37610948cd563d8a05496a98bfbab706d08eb661f4de887d733512ec6fce53438298bb1359ca9144478c4956c6150fb8a166670bdd3d
-
Filesize
1KB
MD53f15ff9e75a5f8cc74b8038eb4844f07
SHA1d07e2e1e7e9d34aa9222b85f41939a1a8c8e4a7b
SHA256c521d466490d4c7652a84252c5f0433027be91243fe09c49a437d8ce781b94e1
SHA512fd816e326554659b99ccc6192beb7e735ea570caac0fcad6f035235d46f0cb26b8b0aa6f7175827a19f73581d9e20a63e022680c8b7afdca9399b34daecbaea6
-
Filesize
1KB
MD52151d2d20bfc4f95cbc5d933cb24a75e
SHA182949d8a77d7117163e1df08a58bab9ee97e2408
SHA2560c39dda9c698d1f744032a46e2b4ba95814eea0efd12060938c78838169f7871
SHA512c2e73313f241a154ba84cd512213e497b94635f54fbe06f2509dff5479cbed7e2cd6968c41ad4f2aaf7db6c45256ffa4bc71e60b8edc472be0e1aee9b14814a2
-
Filesize
1KB
MD57ea51045ab1b9556e2b2d6d72527f040
SHA1a491f99c6c8ad7f1df32fb3a164fbe7adc5a4657
SHA25673edbf575378f048323ee133b8a407b95563066a1009716801e72fe125a82280
SHA512defaed1437c0d68c4a1e865ca6fea77eb007b24ecd4a9e6c29bb6c5192dfe406f9dbea66f9b5377aea9eaed0c0e86a8065165870d62a7446da6a060d6bad7a41
-
Filesize
1KB
MD5ec41c682e5831a149efbbb1d1e1729a7
SHA1fb0e5b41007a31426ce83f08dc6184d8d1850034
SHA2567a79e01848a21029707549d203ebf8d599a25fb0a49093e36c7f9f824aaede2a
SHA5129fe5b3ad47466bef6963682fee3afe4831aedfd418a5296590544d356fd8f2308aea8bc6fe20b92675bf7b4e67d5c2ee84a0b36c5c4b8c07fdef11e947f8e075
-
Filesize
6KB
MD562a046346ec8b075bbed9139e3a878be
SHA1d7b56073ea91660c0559807be38f358038a4e723
SHA256bd25bc439edf7b58de51b97384668e8d5f381e1ffb0ae1cdbae84934ea2083a4
SHA512b0372f71f63efc459438e87ae4104c24e47707260576b31c37f250d0fb649406d14b01d180f205db57b07ea6560ec2f11fd5e3cb5300886220b94e0b86a9e7fb
-
Filesize
6KB
MD571f799417b841c724f0218a87e02ce9d
SHA1f3eddb4364b8c4f79e8bc4e84d9162c6f4a02895
SHA256758ae5b7a0a68c87ad243950c850d98d54dfa08f69af153f585383c2291e491c
SHA5126f11b84f9911b90d54919e52d9978b90c22ed71b6cec2548079c47f4f1a2ba566b33dc60c3a4ff46776153af0f7b3fefcb70fd9acd6be53e832a184b78d425a2
-
Filesize
130KB
MD5a046190e552da2de128392a16e8e65f0
SHA1a5d0a83c3bece0b274c5c099b81c627fccda59b3
SHA25634ecdcb09c27e33d4960afd388f9d80b3ca6b5818f33aafe78bf9e26980543a5
SHA512619d8b5cf66857b688847cbe66ed01d097ade4e74f20cef1951e039bb16dcd8572c591b8d940b03b28642d37477025f2e23d2d815ce22a18ed0e78ccda62c919
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd