Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    39s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 14:59

General

  • Target

    PDB9EF6WN4sfZaza9kI4ppLvgoocljLM2YorbEGTtDozXP.exe

  • Size

    2.3MB

  • MD5

    135b03e3945de185d47f8cbb36453d71

  • SHA1

    9e2043943c1cb42683773a110f93471733725fcf

  • SHA256

    f39b5ee35954c63b6a0416b43d5565c371381c0cf535255bb2a169e83e896cd0

  • SHA512

    3e6807eec5f9f6d2ae4ed8e7e01732fd17b2e5a9cee8ccd2af482ffe729ed68b1ac70184095d570dbaed085fd4714efad06b1878b92d85bde2b727531aeb2318

  • SSDEEP

    24576:jjvjElt4741dXRSfooonFUZ5s8SROJJ6AmjQQuYTj:jjjn4DXsfookg

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PDB9EF6WN4sfZaza9kI4ppLvgoocljLM2YorbEGTtDozXP.exe
    "C:\Users\Admin\AppData\Local\Temp\PDB9EF6WN4sfZaza9kI4ppLvgoocljLM2YorbEGTtDozXP.exe"
    1⤵
    • Modifies registry class
    PID:3328
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3960
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1636
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffebebbcc40,0x7ffebebbcc4c,0x7ffebebbcc58
      2⤵
        PID:2652
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1940 /prefetch:2
        2⤵
          PID:2580
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2064,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2168 /prefetch:3
          2⤵
            PID:2716
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2300,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2472 /prefetch:8
            2⤵
              PID:2796
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3204 /prefetch:1
              2⤵
                PID:4524
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3324,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3272 /prefetch:1
                2⤵
                  PID:4728
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3184,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4600 /prefetch:1
                  2⤵
                    PID:1476
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4780,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3716 /prefetch:8
                    2⤵
                      PID:4072
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4868,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4884 /prefetch:8
                      2⤵
                        PID:4568
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4596,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4808 /prefetch:8
                        2⤵
                          PID:3920
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4616,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5032 /prefetch:8
                          2⤵
                            PID:4548
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5096,i,371236834696878648,10815369731603859177,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5084 /prefetch:1
                            2⤵
                              PID:3960
                          • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                            1⤵
                              PID:1580
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                              1⤵
                                PID:916
                              • C:\Windows\system32\OpenWith.exe
                                C:\Windows\system32\OpenWith.exe -Embedding
                                1⤵
                                • Suspicious use of SetWindowsHookEx
                                PID:3936

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                Filesize

                                649B

                                MD5

                                7815573636c46be51c26785d561893ca

                                SHA1

                                6abc9a28f491c00047f8dff8e5c527fb6790c674

                                SHA256

                                946640cde34d99636adf8200d5a2dece69bb0e569f94c293b757979ea16383b0

                                SHA512

                                779acbb79ed16445692d33af79041a9e57869dbc0b9fcd335563a18905ae9f987e396739c7b4d296a5c913d253984bf86299a82e6f49b498220be08106812615

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                356B

                                MD5

                                c7345a2c2b6b48d55952c9691a6dce09

                                SHA1

                                e8836e568ea2f6010433be4e7e5f06a9602f52f1

                                SHA256

                                a3363e78daf3ab6417906d9d9ca308ba4521ba9eb88b4a871b1e19189b6ea292

                                SHA512

                                e81f5c9695a7e5eaa097af52df8346e1ebc8dd0aba3b8c5f366d152efa061e7d728aeda5a5a090b7cdbeb409a89ddfba2a1eec7bf5d7bba214c0e0fadcfa6171

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                356B

                                MD5

                                36c23f37bfdd4c964d98f4c224eb52a4

                                SHA1

                                147bb760f62e87b9d976b36b29b8828aa2864b19

                                SHA256

                                aaf2c16018138aebecaeda185f90b8e6cc064fc450dffde90920708b582c22a1

                                SHA512

                                dc083db7cb3a4838d1092001650b138f5c454eac4e051e50cf8d82d85e08e8989d26d64ee4ab2a7137722d8fe786563ba61471f110ba8206329f546080cc7718

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                8KB

                                MD5

                                6c56c31c6515eaced8a54e9fe865e47d

                                SHA1

                                eb3bb2ce85cc2ea63d5e8a03d62726e510e57e77

                                SHA256

                                de4e9be1a7e3ffc14d9c11cbf47e1353f55920cd3d776021f9a8aa92b85137bc

                                SHA512

                                dae899b774f087a784d781b0bfa65fe0e3ff7e55d1e3077f2776609a3f5e09d93b1d165ccc32c6a95bf52cb022e64d3d78052d53f2930bcaf794da0d89bf8e6e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                af68abe1ece7b81e47b36f2278fe3b61

                                SHA1

                                e68cdab7846dc78290544ecf765d02f17bab6a18

                                SHA256

                                ff5592ee4306f3d0f430eaee0973faae0558c0a7b54c2a004bebc0e7569bca85

                                SHA512

                                5418ac57aa7cdf05181a8eeebc862084ae579677d0d0986bac8ee88e8c635412f89930d050130cedc06571adcdee4fce27b513b072dcefb3ed551bef97847b5e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                15KB

                                MD5

                                61caf832cdc0b284656811e8f82a6de0

                                SHA1

                                234d0f8906daa8fb5defdab55394ac922a739de9

                                SHA256

                                d19a7aa32ca748ecf07f6454ff0d5fbb1f80f8b902b091a8e8e5f3cdb071177c

                                SHA512

                                5b02678310383a9b2dc3d41cb260f60ed187ec24af4ff8c7a438e1c8e2d55fc4cc6d73b07d15313c08dad487017d346aebcfa72a9ee9fa71205033d7cd3876aa

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                152KB

                                MD5

                                1abcb266eb8edadb791372dea53e66c1

                                SHA1

                                a94974010fc4e47ccc8354e3426a6f43dd695b6f

                                SHA256

                                82ff6ea90f68107b687c8a8d6a43779ba458e77d66e8b995b93e4f21b1f3a31c

                                SHA512

                                a12713aa252d01763ffd6f6f086655cffd9b056445b6fd65732175a67daf0e91b712a647d86f84e692e68d2ba190e99aae2f22610450eae0a14857e765b25393