Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/04/2024, 09:08

240411-k3wdbsgd24 1

11/04/2024, 08:33

240411-kfwqksah3w 1

Analysis

  • max time kernel
    1802s
  • max time network
    1800s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 08:33

General

  • Target

    https://www.harpercollinsbookpublishing.com/

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.harpercollinsbookpublishing.com/
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf5619758,0x7ffdf5619768,0x7ffdf5619778
      2⤵
        PID:4148
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:2
        2⤵
          PID:4824
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:8
          2⤵
            PID:2512
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:8
            2⤵
              PID:2972
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:1
              2⤵
                PID:1636
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:1
                2⤵
                  PID:4744
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4424 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:1
                  2⤵
                    PID:3404
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4832 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:1
                    2⤵
                      PID:444
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3364 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:1
                      2⤵
                        PID:4868
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:8
                        2⤵
                          PID:3876
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:8
                          2⤵
                            PID:3856
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4856 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:1
                            2⤵
                              PID:4352
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3160 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:8
                              2⤵
                                PID:3760
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3232 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1356
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:2256
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0x510 0x514
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:564

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                552B

                                MD5

                                37e0acab7af566d0d8ea0875c9601da1

                                SHA1

                                c391923d17750aaebe65a9a654dd0f2d7e40f9fb

                                SHA256

                                9cc9e3a1e079171feba800408cc18a66d47b95ca3de3c1f9b4482d8cce300e0f

                                SHA512

                                d2f2e66f3f9f797bd5caf8269822b694198dfd10972190ca63778599f166bbb4640c6cae3b5953a1aa2df35586e3116045e7e205998264933581162b65a4cacc

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\139b55a8-4679-48f4-bed3-0321babc93d0.tmp

                                Filesize

                                2KB

                                MD5

                                7929124e77a49effe6cbaac9a1b5bc5f

                                SHA1

                                0238e3c8a711ac29a625a462ca145bec706471c2

                                SHA256

                                a14a9bc8df2afc7f9075bc6bef529c1eea1893e7a5855c865c3172f1783088d1

                                SHA512

                                597c4f22eacddb2e48fd583d30122492de98ecf58aa44708566c1a0e983cf19475f9cf06ccca92b35907224752e7c811b22f221ae63b8969a19c0c362db89ad1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                4b04c651e190840ddf0c90d0e0baa5da

                                SHA1

                                85f18294553483100a1a02a054ca2abd6d887dc6

                                SHA256

                                d8bc4cf907f5490eeb03c3f2e577ecce71d24c4b910c4d85456c646b3c15741f

                                SHA512

                                1c13d12a4a23aef3f8c2de605f6e3803b2e39d3609a594a353d906e795af827c71668a5ac0b4abf0a938197faad39a9ce21d78ef7c8ec4a869ff508ff21af3f6

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                537B

                                MD5

                                299cc47f6e9fbdd4b59f2dcf358c4b5d

                                SHA1

                                414097f07b61794db550930c40857b0e4324588d

                                SHA256

                                8fad56b1f13edfad1dfc925acb5cbafc66713bd9e08243cc49b2027f2ebabd05

                                SHA512

                                ac548aaa4e2072438fd4f3d5a3d273150c3042a6eec978b4aaa20ae6e62937a40c0508eff1155bd0da2aca2a1dee56b2206c3262e4df04af09d6fca70d317dbe

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                6d2577dd093757884147248e1bd8f16c

                                SHA1

                                8d31a6fa529fb2b3c90903a4b972fbd827a23a65

                                SHA256

                                125d7a88aeb72e27a20fbe6ecd15818e2a490eeac8753eceadf2d87ad8e9ca88

                                SHA512

                                b5b7f0eb9cb7a9802159cf4dc4745d82084627d9592e7ee82f5ff134266f416af0ea2522b1c205b37e98b775f890264f577a1a4658198e74b1caeea2c1cd0830

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                7b4ff33f13efb499f0c52e6a9221d179

                                SHA1

                                91d6f93c560805f4a560b46137f0386df203652c

                                SHA256

                                277a32f39546604d6556c0aa38c34eeb00e002e0289b9baf0e0e95ef46d0e055

                                SHA512

                                f35b17e6bdc9ccf74d286e148c6da1486663c062e0549d5e93bdab46be01dd8004fea43e01b71a996ba9dcc8ef7bc797c361dcf6fe20d23f135475433c3e0288

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                128KB

                                MD5

                                04278a9eb85fd6dbecee5844f1027078

                                SHA1

                                df3266179039fe7a2965a9dc786c1ee6474a265d

                                SHA256

                                1607f3fee9ecd79618a93cbd7b843958b0c2e83fbc0c8db3fd6abdb35e6f19e8

                                SHA512

                                a23dc78d0cda5d26fd930461fa3ff8147c65614443251d635e34fc160ea8c7fa4dd93975019eb6204b83c7cdf4a810c9a8026f2f022804437ae47778463d1bd1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\dc3705e4-5a93-45b4-bd4e-94dc14c5cff6.tmp

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd