Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/04/2024, 22:00

General

  • Target

    75b83e31bf1fbd3c41b9f4d8d5dc7d8196b6f56405c05d254511c85bd7c4df9e.exe

  • Size

    1.1MB

  • MD5

    e2c0063eabdf7b46878c33e5cb9c3c36

  • SHA1

    5e116cdf76996369009e6cbfd6e4a2db6dd42f43

  • SHA256

    75b83e31bf1fbd3c41b9f4d8d5dc7d8196b6f56405c05d254511c85bd7c4df9e

  • SHA512

    a1674e24774f505eaaed0b3053cc7b4d8c3adb4adf25f3593facd5890432bb99917f54601138227ed8e36ba5decd7b7bfeb8d5ec028bf6c0cd50bf2de7086425

  • SSDEEP

    24576:aqDEvCTbMWu7rQYlBQcBiT6rprG8a3w2+b+HdiJUt:aTvC/MTQYxsWR7a3w2+b+HoJU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 51 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75b83e31bf1fbd3c41b9f4d8d5dc7d8196b6f56405c05d254511c85bd7c4df9e.exe
    "C:\Users\Admin\AppData\Local\Temp\75b83e31bf1fbd3c41b9f4d8d5dc7d8196b6f56405c05d254511c85bd7c4df9e.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8879e9758,0x7ff8879e9768,0x7ff8879e9778
        3⤵
          PID:2860
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 --field-trial-handle=1824,i,8484697281183150707,1568915096789550380,131072 /prefetch:2
          3⤵
            PID:3468
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1824,i,8484697281183150707,1568915096789550380,131072 /prefetch:8
            3⤵
              PID:4948
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1824,i,8484697281183150707,1568915096789550380,131072 /prefetch:8
              3⤵
                PID:4612
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3156 --field-trial-handle=1824,i,8484697281183150707,1568915096789550380,131072 /prefetch:1
                3⤵
                  PID:1736
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1824,i,8484697281183150707,1568915096789550380,131072 /prefetch:1
                  3⤵
                    PID:2972
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1824,i,8484697281183150707,1568915096789550380,131072 /prefetch:1
                    3⤵
                      PID:4836
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1824,i,8484697281183150707,1568915096789550380,131072 /prefetch:8
                      3⤵
                        PID:1904
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4836 --field-trial-handle=1824,i,8484697281183150707,1568915096789550380,131072 /prefetch:8
                        3⤵
                          PID:2256
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1824,i,8484697281183150707,1568915096789550380,131072 /prefetch:8
                          3⤵
                            PID:3504
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2612 --field-trial-handle=1824,i,8484697281183150707,1568915096789550380,131072 /prefetch:2
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1616
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:3324

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          216B

                          MD5

                          78d213e765355af0afef132b750042d8

                          SHA1

                          cb6ce469070456bdc226370357021e59880b4332

                          SHA256

                          1b291a0a6bfa5736ff7cb67b9a1471f146a630153a4d324464c8081e868b734a

                          SHA512

                          42ccba766eb84f0a87fa86ea2673d3f87d10de02e3a158bdd70a5d410363a3bee7626a36a7700a169996833493bdb0937392b9cefe658ac997088f68e3111c67

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          b806f12a61a51326e99766caca48fc82

                          SHA1

                          5fc0a7688a96afc6bd255a6b811053748046e3b3

                          SHA256

                          83880769520452e290017f020bd6fda4ad8f9b19840808c5fa51c00820ca7993

                          SHA512

                          6e92e5e61a4f2194dd8f4ea6d446c21648600d17effab641679b6202ef480992967c90bcbface7c4ca5a9d8d10c8217e697e7b8db8faf4fb425a372262b85fe5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          ee96706a8861aec74fde6ff410b65b8a

                          SHA1

                          62ad565e837e5b8f3515c89d95298a4df58a89c1

                          SHA256

                          a66cc3397f5fa4b98e2f79e3e6ff30c3f2b480a93cbf074f6307dde89fc94ce7

                          SHA512

                          3724d4fa02075b22aabba1d0b20693e6e34017860b77197b5827b6427b3de4feffe87f4867fb7254b5f5bea51f9f41a5d839fa08c4be2b7049812531c45eeff7

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          703B

                          MD5

                          bfd45641f7431fc66502ba8808401b14

                          SHA1

                          8e238bbf3741fdfc370ffffb9394e947f2c94a23

                          SHA256

                          0ae13feaedc9ec4c2c93ace03434b792fe0f3f50007636cdcfa3cea2034a0945

                          SHA512

                          7ab48ee7e580b472dcbf505fa8fc0e51c41ddb707ab34a87078ca734ee9d7b025999036fad63ab8a3017dfebb6b66d95bf0f1710e3301517a951dad667a8da8e

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          816792d50d90066a96fe5ab9f5063a80

                          SHA1

                          a5defa688c75252101d40f876c80ca4d34493ab9

                          SHA256

                          6ca3e299faa847cb6ef7d897d5843bb050295321504978f5e9b3516550f08ed4

                          SHA512

                          b8c08efb4a2c1402ff52e3b585c5a7bc3ab48ad58044de0b7015669462faca3e0833f455178f3bd408680fb3e1752fb930cebe8bcb1f400402795ba2243ac0ce

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                          Filesize

                          15KB

                          MD5

                          400fa3e34343b1766ddc490e570281dd

                          SHA1

                          0eb794e4b928cf4fe69273923107b7bb635cf556

                          SHA256

                          26c11d19baee1ee04eb1b385822d7f61b044ba5532cce8b4795fcc4976dd30d6

                          SHA512

                          ed815502a1997fa4d2ba107107859aa0a4857787fa994bcc39cd41b0fc6e87b9a93073b7aede48807e2e583d0deb70339c072d02b5c019dc450540edc76e960d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          261KB

                          MD5

                          0fe07c8001cbad45eb620339036db658

                          SHA1

                          d5664611e78eee48048fc3a669dd0f0428b781cd

                          SHA256

                          edf6b120b7d9c4af08c1ef8cd5615f3b983fbe74d4854fc6637242a783930d09

                          SHA512

                          1f7cdb228aad05eb87a74e557ca42d15253b71f7d27c314cfcb9e89cc31368d99d196f33d3754c34d4eaf9cd29fda70c646d92c4ba1ea5ce5ba6974deae61bc2

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                          Filesize

                          2B

                          MD5

                          99914b932bd37a50b983c5e7c90ae93b

                          SHA1

                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                          SHA256

                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                          SHA512

                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd