Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
2vRnWYoI.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2vRnWYoI.html
Resource
win10v2004-20240412-en
General
-
Target
2vRnWYoI.html
-
Size
2KB
-
MD5
46b69f4d4f882a9e2f5354c3f4bf71fa
-
SHA1
515d6bdf568c079955ceef02777273df6b7e45f5
-
SHA256
7ab6ab86f9326e6b8498e84d8016b4ca8242e5cb73c98ca731f304ce42996413
-
SHA512
d0cfee91677a864138b0d49387efa50309fdd18a77063fab2721f6b3c36c98e6df515746b2be5ac36fba8738918761b00f348e5061e3613c0689375f1a1088a2
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133580344371380201" chrome.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3588 WINWORD.EXE 3588 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3808 chrome.exe 3808 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3588 WINWORD.EXE 3588 WINWORD.EXE 3588 WINWORD.EXE 3588 WINWORD.EXE 3588 WINWORD.EXE 3588 WINWORD.EXE 3588 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3808 wrote to memory of 2484 3808 chrome.exe 86 PID 3808 wrote to memory of 2484 3808 chrome.exe 86 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 1932 3808 chrome.exe 87 PID 3808 wrote to memory of 4448 3808 chrome.exe 88 PID 3808 wrote to memory of 4448 3808 chrome.exe 88 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89 PID 3808 wrote to memory of 2704 3808 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\2vRnWYoI.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7fff5289ab58,0x7fff5289ab68,0x7fff5289ab782⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1840,i,2772414282719485302,17771042696883403916,131072 /prefetch:22⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1840,i,2772414282719485302,17771042696883403916,131072 /prefetch:82⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1840,i,2772414282719485302,17771042696883403916,131072 /prefetch:82⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1840,i,2772414282719485302,17771042696883403916,131072 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1840,i,2772414282719485302,17771042696883403916,131072 /prefetch:12⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4332 --field-trial-handle=1840,i,2772414282719485302,17771042696883403916,131072 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4480 --field-trial-handle=1840,i,2772414282719485302,17771042696883403916,131072 /prefetch:82⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4612 --field-trial-handle=1840,i,2772414282719485302,17771042696883403916,131072 /prefetch:12⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2792
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\DenyResume.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD537a5172c003c43ded8d00854c9a1c865
SHA1e6eeb9d031551970c722aa3d744b304b5c95afdc
SHA25679663bc3cf50bd1f6baf793d6cbf7caf531de7e7996d8beeff7df9187c11d6fb
SHA512fbd33fe8999d8f84b372af7905069f4878c9daf772797b6d8ab30320d3c3da6de5f0f4259bca7b00c2ff829ac34d40b138ea525b024b7b6d244d8570e33f658b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5d876fef961e129033a11f16f117c7871
SHA103a2ff7394cc585d6d4eae2d5c11e7625a84d800
SHA25690ffdf555ac8ec7aef3b7846dc709c5dfd993e7ac65e627ca06a7698caba93a5
SHA5128842bf3c38a5519027bbd1b5f7d28608ae23f7730dc34708ca7a5dcc410020526158f0589640cea4d327af568e10ef4491c0af72717b372666fb8a2ce299c0a2
-
Filesize
127KB
MD5173f57bf3773f958301abec51af00cf7
SHA1ddfddadb9b952c8a1eb0695f5cd8d85e0ebd8c5c
SHA256027ec2ddb84e215499bbdf162ab3ec25dfdf9a280f167f519a1544af009bdd61
SHA512ea1ec303b0f5124d4b8fd482794ccc74f8b1d7dbfd67daf883ae3203203b2ea46b0096a9f2a2ef5be27234c14b7b8f8823f3be890d27ca75b3b6d1b12119e3f7
-
Filesize
127KB
MD584050b4256b1085c6cf31c882157c210
SHA176aacc3c73f72c5fe0ce4fa45d6ed128a09d0006
SHA25688baf2ace0a8b5ffab1f36a4f2ed7a4efce5a994ed1a9aa288b2d9ab5f885ad1
SHA51287b4fbc27d0f9272d336caf45a318991bbc8c17f217222758c0e823a86490ca41aa5ecf3a356d633e6c964df761080a7c33bcfb6e15ea01a84eb5ea85a35bfde
-
Filesize
264KB
MD5ca77334ce9e0f769c51aeb82fa4b4383
SHA12322075999023dc2e57bce808e51ec7ed34c281d
SHA256879520853134d05fd24d802ef82d27b8d0408dfc6d2799723d285bfe55b7ab32
SHA512a4b894ad639777c0b2f27b35c39752b5db4bf4be6abc31fdf22c12a4b36de2c5d877b9c4a4756fe85093205aa61e74c0260e457b21366d5431e6e4bd470d73bc