Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/04/2024, 12:21
240417-pjjbwaga8s 319/03/2024, 10:24
240319-mfpy5sad21 319/03/2024, 10:24
240319-mfb3aahe54 119/03/2024, 10:21
240319-mdp65ahd96 419/03/2024, 10:18
240319-mcen1ahd67 819/03/2024, 10:07
240319-l5x6dahb83 319/03/2024, 10:03
240319-l3vbpshh6z 8Analysis
-
max time kernel
1861s -
max time network
1776s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
EEEE.webp
Resource
win11-20240412-en
General
-
Target
EEEE.webp
-
Size
29KB
-
MD5
9485ce793d80b28b1f1a5041df199f36
-
SHA1
cc6ef9708c3d31f6285e6172745f3af032d8342c
-
SHA256
0a411e6a7f0499422b355db020dbc65be2cd2ef1fa297b752587080e66cac8d5
-
SHA512
e547b8ff6d1b5c54740426ad387530acedb1778b2d79f10ce793eb4adc8b85b02078622a188dfa0428e500918773095a60faef4285059ed43418872e555c478e
-
SSDEEP
768:iHv2vZr2itn04pqNFiFe3QCtVJ1b/7z8Vi7lo:F2Kek4QC7J1b/H8Co
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578389668916589" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 4068 chrome.exe 4068 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 2024 436 cmd.exe 81 PID 436 wrote to memory of 2024 436 cmd.exe 81 PID 2024 wrote to memory of 3104 2024 chrome.exe 84 PID 2024 wrote to memory of 3104 2024 chrome.exe 84 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 5076 2024 chrome.exe 85 PID 2024 wrote to memory of 2108 2024 chrome.exe 86 PID 2024 wrote to memory of 2108 2024 chrome.exe 86 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87 PID 2024 wrote to memory of 1548 2024 chrome.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\EEEE.webp1⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\EEEE.webp2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xb8,0x10c,0x7ffda776ab58,0x7ffda776ab68,0x7ffda776ab783⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1560 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:23⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:83⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2072 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:83⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:13⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:13⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4360 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:83⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4420 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:83⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4272 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:83⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4232 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:83⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:83⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4428 --field-trial-handle=1904,i,15919872225823709192,10343529573051837908,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f94667f1c70af96250e00730837dd9f3
SHA1dc3240fc09fb7cd5a6326507aa9f85e7ca127396
SHA256a4018cfa6707d78ecef9b50d0ecdbff9d3f78d9866daeedbb04d082464c29878
SHA512d25ab54d1176979643ea2c486cf96fe23172c178ef6a5b27409d6c524fcca3cb1e478b708677a21822e198845c70ccdb9f2c14e1f7ff1a49a9a792bbb6046c7d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD58ed5ba6e317622f3dc1b48dd8ab04e2c
SHA1a591ce28b3cbafc8645660aa50449bfe513f068b
SHA2565c8cf4538f1ba50f193710cec64d1f6296e69fcfd3d16dc9d7bbe203a64e0fc6
SHA512854bcbb343b78de59cfa76d81cadd5b8b48cfc84f39ab24e3f26104351059f01341e19f729180e12766c9ffbe46261cdee6b38e01943874fa12f1f96e5c4f073
-
Filesize
16KB
MD524c7e75aeabb9988469795f45b2ae2dc
SHA17f89ea92eee0edaf931ae12059df704433c09e92
SHA256cb1a852bd6a82220296eca282ab776305e19064bfbb80b7ee1ddafb463d4d8fb
SHA51268b82f2f7d149bbc7b9cbe1ad2681be3a8b56a05d2183053ce7828059eedb2c10ecebaeec3e936918877f57b06c015a19306bb8be838e02b70dbe6124b740e4c
-
Filesize
129KB
MD5d8ae44c16af41eae1f52e370684278e8
SHA146125800a20a4913bd6eef90c638a461dfdbdbed
SHA2568121dc21dbb98e5b662f02e87712a78f9f93174874936a8eb8b453cb7e8b3585
SHA512d26733a833b10acca9564a0320bd1261072ba87c41168bbc7dc8304e215a514df78f2fa66113da2ea82e33a12e510b2a4770ab6ae061f2e5ab490e44689ee6c9
-
Filesize
128KB
MD5a096d5a4e3c741b962770f7c62f4c54d
SHA15f63c730efcceac28528ac3c5804ce6953f73137
SHA256203badba33a7931adb54570b05fc7a510964709be76eca6c4af25b5a996760ed
SHA5127249006b8934fb97a415ccbf529fbeee75cd461ea8211775706471ac38073f2e953619328164fb909d1aef1d63606e61ce697283007be106a895b69fcfab912c
-
Filesize
252KB
MD588ed2c5a1729f19fbcd04e3c98a33e8b
SHA1a50feaafe7f151042173f03aaa8063561316dee9
SHA2568e692c0f7aebfc42e1ad872c5a7f7fbfcd341dd9c39114973a49d6ba8adbe824
SHA51250c4d1da25036396f1aa2a524dc3b5a44c2638aa74f060594c227f784209a0fcedf3a956359d923cd26f46617324a7f6244992663f3ee60839d794ab79d6ba53
-
Filesize
252KB
MD58ca5a775a0d20b07ad49a3547df2bdf4
SHA1e1ee651eee54e3573a1751cfff3f1ab3a2abbb5d
SHA256f0a5ee964311c19ae4a65dbfc7ee1eb9579cd71032831a3086597196142f1e02
SHA512e2cbff03ff4f445978328cebb604604d260cbcda90e86e2cbdbfbea184c4e2c6793c3cf3e02c7efc0128eae65d9cff6e6d505c655029cea3a68ae5904bbe5aa7