Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/04/2024, 22:11

240409-131wtaea38 8

09/04/2024, 21:43

240409-1k5r2scg65 7

09/04/2024, 21:18

240409-z5mxasbe59 7

06/04/2024, 10:55

240406-mz7nashc59 8

06/04/2024, 10:41

240406-mrjaqsgd6z 7

Analysis

  • max time kernel
    894s
  • max time network
    1205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 21:18

General

  • Target

    chrome_200_percent.pak

  • Size

    175KB

  • MD5

    9c379fc04a7bf1a853b14834f58c9f4b

  • SHA1

    c105120fd00001c9ebdf2b3b981ecccb02f8eefb

  • SHA256

    b2c25fb30fee5f04ccdb8bf3c937a667502d266e428425feeb5af964f6167d48

  • SHA512

    f28844dba7780e5f5c9d77ac3d29069dfcd6698447d5723886e510eadd51d6285e06adbda06bf4a69f841afc161c764cb2e5b9ad2c92f0a87176709b4acd2c13

  • SSDEEP

    3072:oDQYaEQN6AJPgqzOovg6/Csp7rfR54x5GMR+F44ffbdZnYw9p4AbIVGYoDd+HxNN:oDQYaNN68gyrgKpngx5GMRejnbdZnVEd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\chrome_200_percent.pak
    1⤵
    • Modifies registry class
    PID:4444
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1504
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1716 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5132
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:768
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5204

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5204-0-0x000001B73BDA0000-0x000001B73BDB0000-memory.dmp

        Filesize

        64KB

      • memory/5204-16-0x000001B73BEA0000-0x000001B73BEB0000-memory.dmp

        Filesize

        64KB

      • memory/5204-32-0x000001B744210000-0x000001B744211000-memory.dmp

        Filesize

        4KB

      • memory/5204-34-0x000001B744240000-0x000001B744241000-memory.dmp

        Filesize

        4KB

      • memory/5204-35-0x000001B744240000-0x000001B744241000-memory.dmp

        Filesize

        4KB

      • memory/5204-36-0x000001B744350000-0x000001B744351000-memory.dmp

        Filesize

        4KB