Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 19:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/1mzes8dmze944k4/Xmas_22.zip/file
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
https://www.mediafire.com/file/1mzes8dmze944k4/Xmas_22.zip/file
Resource
win11-20240426-en
General
-
Target
https://www.mediafire.com/file/1mzes8dmze944k4/Xmas_22.zip/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133592375901335724" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 3520 chrome.exe 3520 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4048 4832 chrome.exe 91 PID 4832 wrote to memory of 4048 4832 chrome.exe 91 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 4892 4832 chrome.exe 93 PID 4832 wrote to memory of 3212 4832 chrome.exe 94 PID 4832 wrote to memory of 3212 4832 chrome.exe 94 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95 PID 4832 wrote to memory of 4600 4832 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/file/1mzes8dmze944k4/Xmas_22.zip/file1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9e6ac9758,0x7ff9e6ac9768,0x7ff9e6ac97782⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1852,i,18348206510546194267,6758838611836999412,131072 /prefetch:22⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1852,i,18348206510546194267,6758838611836999412,131072 /prefetch:82⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 --field-trial-handle=1852,i,18348206510546194267,6758838611836999412,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1852,i,18348206510546194267,6758838611836999412,131072 /prefetch:12⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1852,i,18348206510546194267,6758838611836999412,131072 /prefetch:12⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5400 --field-trial-handle=1852,i,18348206510546194267,6758838611836999412,131072 /prefetch:12⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 --field-trial-handle=1852,i,18348206510546194267,6758838611836999412,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1852,i,18348206510546194267,6758838611836999412,131072 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=220 --field-trial-handle=1852,i,18348206510546194267,6758838611836999412,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3960 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD528275d0fb07c20742436737f27ca789b
SHA1c92f373ea1bb36d1a92c5442f40b1c8b6cecf040
SHA25685cda2d1b6e3ffe654bd27568d867946bfa8b72f1b37b50adca9b3ad0168d44c
SHA512dca4c35ea645d164ba0be1f5b32536fdf49c857e5d4fe8d074f539539aaa37017a01238ef4fbf1f29b4ab355aa47a649c473a5267331a44c0d900a4070dc19cc
-
Filesize
7KB
MD5be9a2c3c1df7f1e095b8016b3e299992
SHA1d72047a77e3c60028c48a6861f15025af470208e
SHA256acea2c56e77496c4353039b46b4e92a893aa69d7e44cdee6839535fd0ff9226e
SHA512f5ebcaf5f6be063c95d64f6dc93163c7388fac4c8300ecf7fd2bd8d36234e33f761e5e0a9fa60b44f2a05313775cb0aeb9b3deb4eb733ac9c930c3dceb2496f7
-
Filesize
7KB
MD5ed1e24ba9ed4ecf01207631b3fd1b18b
SHA17c5c80039731337735b94b0969fbca27afdf0fb7
SHA25645939e00af179a8d4a6b1aa63288bb5cd8aa5b903ea2093febe0066e94695512
SHA5124e4bd2c014e4072593cd214be51e382c681736d6fddc895574f29c0cfae3a026a836f8059aae53e3313011e19b49a17db94c131481a5dab49dc082fcaf6a1e72
-
Filesize
1KB
MD5973554dc26ecfeb861a2732062d85b53
SHA1c1d9c94e8d4c824858d630434d104cfa629a6836
SHA256c647e39284bb8d4e1ce58e68e0cfd9f67484f0f90a5620d59eef3e680de25dc9
SHA512bda1c3f5e4e9176611a2b412b850a5011298321690cda1bf933b97df3a3502bc00a736e73a766d2af1d23f0db862ac52fe2149a28be4cb66ef7aeea14f839e2e
-
Filesize
6KB
MD5c9e807ce2848bc51326343aa10815918
SHA14b6352c132a422ba8a3d0805150313b71c020942
SHA25640a4c69249be24c7904221faedb80274cc4c7fe9ed4b103e07049f7e2d335c1d
SHA512259e08fc61beed08ec6a1e8e61fc43f1ccc4c851113cda738657f9c106ed83947d2ace6e59071487f26a0a7e9c78364599bd5530e26a19feddc3bf611990ab64
-
Filesize
6KB
MD59d259432afca53d85a59d1dc0aaa6ed4
SHA1a28277906ed61d5dcee710dcb0e29a473c5f3066
SHA2562e29069c5a87d28785280d5ce9d1b958f4887d226940eacaece4fee8ee2d2a07
SHA5123a0a7075d3b2fb348a5afce4fb8b457f8484ddf2166d9c585fa5398d9f20a278f1a1bdb5c18fd5e5634ab62577454a0b0338c424360239a3b0190038009234ed
-
Filesize
5KB
MD52b875fcd6eb822a66b2eb445548f0404
SHA184716fd8961ed35bffa632f6fe1ce43d803839d0
SHA256030064cde97e0a56f28e8acb40132deea09513a8e624f7bb08d255e9169bcef5
SHA5129f1f7855bb955e998b3b33eddac7784ceb1d34bfe1e5101ca05b6f84a96e6041ad13a46ed6ce6887c951952b5e6ca695524b1b22309f019a8104401370a6c4da
-
Filesize
6KB
MD5316463925a2b1ea3080ee0584339d65f
SHA1406fbfc5412ecb99678163ae1526de7e5b39e7c2
SHA256e5983ae9ddede9921388a87d8d80e240be82073fea3895d5a7f22811290d928b
SHA512c83e2de6f29b5a5dfe87c1a2237ee631de71dc09cadc85adf48eb3eb1b73a2808a7ee81c6d8ec98b77b9ff88dae4ffd62ebd0fc1d3d3388e610ff30b52e2d3a2
-
Filesize
128KB
MD545b5dc4ac3dd22316c13c8797bede5d5
SHA1d7db3dfaf86ea15d6623c0468aab109713784fa3
SHA256b1c4c3bcdf3a384c9ccf0995b0fdd47165da2c0e16f03bebdb23a9072ea27750
SHA512ed9f4d113820542ea97ad6e412c4bbec55134859d6262eea386ecac806c92b96b77deb3a4706a5fede3cec1555da006830ee58c5e343f34085001f8201792ef0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd