Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:21

240417-pjjbwaga8s 3

19/03/2024, 10:24

240319-mfpy5sad21 3

19/03/2024, 10:24

240319-mfb3aahe54 1

19/03/2024, 10:21

240319-mdp65ahd96 4

19/03/2024, 10:18

240319-mcen1ahd67 8

19/03/2024, 10:07

240319-l5x6dahb83 3

19/03/2024, 10:03

240319-l3vbpshh6z 8

Analysis

  • max time kernel
    1861s
  • max time network
    1776s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17/04/2024, 12:21

General

  • Target

    EEEE.webp

  • Size

    29KB

  • MD5

    9485ce793d80b28b1f1a5041df199f36

  • SHA1

    cc6ef9708c3d31f6285e6172745f3af032d8342c

  • SHA256

    0a411e6a7f0499422b355db020dbc65be2cd2ef1fa297b752587080e66cac8d5

  • SHA512

    e547b8ff6d1b5c54740426ad387530acedb1778b2d79f10ce793eb4adc8b85b02078622a188dfa0428e500918773095a60faef4285059ed43418872e555c478e

  • SSDEEP

    768:iHv2vZr2itn04pqNFiFe3QCtVJ1b/7z8Vi7lo:F2Kek4QC7J1b/H8Co

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\EEEE.webp
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\EEEE.webp
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xb8,0x10c,0x7ffda776ab58,0x7ffda776ab68,0x7ffda776ab78
        3⤵
          PID:3104
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1560 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:2
          3⤵
            PID:5076
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:8
            3⤵
              PID:2108
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2072 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:8
              3⤵
                PID:1548
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:1
                3⤵
                  PID:2676
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:1
                  3⤵
                    PID:4816
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4360 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:8
                    3⤵
                      PID:1564
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4420 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:8
                      3⤵
                        PID:2688
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4272 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:8
                        3⤵
                          PID:384
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4232 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:8
                          3⤵
                            PID:2384
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:8
                            3⤵
                              PID:980
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4428 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:2
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4068
                        • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                          1⤵
                            PID:224

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            f94667f1c70af96250e00730837dd9f3

                            SHA1

                            dc3240fc09fb7cd5a6326507aa9f85e7ca127396

                            SHA256

                            a4018cfa6707d78ecef9b50d0ecdbff9d3f78d9866daeedbb04d082464c29878

                            SHA512

                            d25ab54d1176979643ea2c486cf96fe23172c178ef6a5b27409d6c524fcca3cb1e478b708677a21822e198845c70ccdb9f2c14e1f7ff1a49a9a792bbb6046c7d

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            8ed5ba6e317622f3dc1b48dd8ab04e2c

                            SHA1

                            a591ce28b3cbafc8645660aa50449bfe513f068b

                            SHA256

                            5c8cf4538f1ba50f193710cec64d1f6296e69fcfd3d16dc9d7bbe203a64e0fc6

                            SHA512

                            854bcbb343b78de59cfa76d81cadd5b8b48cfc84f39ab24e3f26104351059f01341e19f729180e12766c9ffbe46261cdee6b38e01943874fa12f1f96e5c4f073

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            16KB

                            MD5

                            24c7e75aeabb9988469795f45b2ae2dc

                            SHA1

                            7f89ea92eee0edaf931ae12059df704433c09e92

                            SHA256

                            cb1a852bd6a82220296eca282ab776305e19064bfbb80b7ee1ddafb463d4d8fb

                            SHA512

                            68b82f2f7d149bbc7b9cbe1ad2681be3a8b56a05d2183053ce7828059eedb2c10ecebaeec3e936918877f57b06c015a19306bb8be838e02b70dbe6124b740e4c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            129KB

                            MD5

                            d8ae44c16af41eae1f52e370684278e8

                            SHA1

                            46125800a20a4913bd6eef90c638a461dfdbdbed

                            SHA256

                            8121dc21dbb98e5b662f02e87712a78f9f93174874936a8eb8b453cb7e8b3585

                            SHA512

                            d26733a833b10acca9564a0320bd1261072ba87c41168bbc7dc8304e215a514df78f2fa66113da2ea82e33a12e510b2a4770ab6ae061f2e5ab490e44689ee6c9

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            128KB

                            MD5

                            a096d5a4e3c741b962770f7c62f4c54d

                            SHA1

                            5f63c730efcceac28528ac3c5804ce6953f73137

                            SHA256

                            203badba33a7931adb54570b05fc7a510964709be76eca6c4af25b5a996760ed

                            SHA512

                            7249006b8934fb97a415ccbf529fbeee75cd461ea8211775706471ac38073f2e953619328164fb909d1aef1d63606e61ce697283007be106a895b69fcfab912c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            252KB

                            MD5

                            88ed2c5a1729f19fbcd04e3c98a33e8b

                            SHA1

                            a50feaafe7f151042173f03aaa8063561316dee9

                            SHA256

                            8e692c0f7aebfc42e1ad872c5a7f7fbfcd341dd9c39114973a49d6ba8adbe824

                            SHA512

                            50c4d1da25036396f1aa2a524dc3b5a44c2638aa74f060594c227f784209a0fcedf3a956359d923cd26f46617324a7f6244992663f3ee60839d794ab79d6ba53

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            252KB

                            MD5

                            8ca5a775a0d20b07ad49a3547df2bdf4

                            SHA1

                            e1ee651eee54e3573a1751cfff3f1ab3a2abbb5d

                            SHA256

                            f0a5ee964311c19ae4a65dbfc7ee1eb9579cd71032831a3086597196142f1e02

                            SHA512

                            e2cbff03ff4f445978328cebb604604d260cbcda90e86e2cbdbfbea184c4e2c6793c3cf3e02c7efc0128eae65d9cff6e6d505c655029cea3a68ae5904bbe5aa7