Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/05/2024, 14:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mover.triglobal.info
Resource
win11-20240426-en
General
-
Target
http://mover.triglobal.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133596507590720550" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3938118698-2964058152-2337880935-1000\{B7D230D0-B905-4838-8472-642D754D707E} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 576 chrome.exe 576 chrome.exe 4812 chrome.exe 4812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 576 chrome.exe 576 chrome.exe 576 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe Token: SeShutdownPrivilege 576 chrome.exe Token: SeCreatePagefilePrivilege 576 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe 576 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 576 wrote to memory of 3716 576 chrome.exe 80 PID 576 wrote to memory of 3716 576 chrome.exe 80 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 1424 576 chrome.exe 82 PID 576 wrote to memory of 3980 576 chrome.exe 83 PID 576 wrote to memory of 3980 576 chrome.exe 83 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84 PID 576 wrote to memory of 5112 576 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://mover.triglobal.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcca42ab58,0x7ffcca42ab68,0x7ffcca42ab782⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:22⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2144 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:82⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2812 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:12⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2820 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:12⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=1516 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:12⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4016 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3076 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:82⤵
- Modifies registry class
PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1824,i,7037105585509553502,15227980021153633030,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768B
MD5cfebed677f1874b4b4c6ecdfb5763023
SHA1d509b97099fa106e7427105e2034fe018dd22432
SHA256e33a916c416351d71d290268f3d0f52a0e38536061eaa9990a3fc8ca96e83c6e
SHA512783136e6977a7ddbe2c6479ba89b4fd214a10135a0b8e860c6f23355a1865dece60fbe69a4fe1f4dcf91c2eb11c40db187888f03b7c96721a3e1b20a03d09fb6
-
Filesize
3KB
MD5021395b589fef692990ac2a07c29a71e
SHA15149e79efaed34de9cf9c7a47007655f30721b5b
SHA256ff30f4734541b9adfd93b5bf3b71eb64ffe7649b4f73cb4cd4672d17df7f0d60
SHA512f585aade9405f7f0a508b6750c2691d02124fd4146d41a653f2490dc73012ad06489ff83f7104360b90415b108e798fa9478a3aa8ba339417f0e2c2bfd4c8c59
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD567748e6ddc701a9a60b8f675e77300f9
SHA1ab484d7bfffedad1d0bd28e507a92c0ddd604d9c
SHA2567551ef5a446722f6565de9718ff2fe83ed348deb5d1d43290471ad397f7ec2b1
SHA512dbb3593399566640df187cd6b8b006669c7d7e7c1017de8d20ecf862cb34ff6659d6299acf7096d3bfd5c691d19df86fe79b410b95706eb9bf424bcf8027bfc8
-
Filesize
1KB
MD53e865220509ae5b09aa0433b24ad96bc
SHA10282fb0715e2de9580b7d1fa663ca4c5a8d1cafa
SHA256eea1c99426234e98a4f1b078627fc5ca89ff0e7b8028d593881c026ae717ad2d
SHA5123e72718d71039a987a01cfc4bb88aa97909fc6756432ce059e02ab272f49e4309e409bb7862727cb3b7aed5a64f6d92113218f0cff10ca4809bede51a40b86f4
-
Filesize
7KB
MD51fc60f0eaa72ac04b18d6942a86a0066
SHA1e706c06cca1a185d24166e045c105a88656f7632
SHA2569a8b85bed16f78ec285eee2940879d0b969c297246d61a8fb2d8886319014866
SHA5126c04d19a3cb8a74b1919d13381561f9becfafb76b6f65683eb05910b9b49fc2d212be15d17e544f84a905244995e37d60a5b20e89a661d7891e5cfc7ebd32729
-
Filesize
7KB
MD5a35ef2250aa2de191c6bc024cfac2eee
SHA1cb72ee4bb70121bdac64ae536e8dc4056917ba6f
SHA256c2d7951d9899c858db231b8b8d51441e381120fda01ade64d697958cf289c5f1
SHA51277d09afd2b40253c569d37a36bed11eacfccba8aba8fac4d35dcc70dd17ddbd7e4cb3305efef7916a1159792575c9b588b9952477f6b79e07320bee97bd51fc6
-
Filesize
130KB
MD517b9cb083f5e31e808a2b0bb8a8744f5
SHA17449e442b6619ed980a26ff0b9ea96082523a122
SHA2560110234634367794c2967fe6c78cbfc3ac9acdad050814a3fba3ebe3937e0e4a
SHA512b39022ff501a8871fe286ef44c644988d1163d88c1e13ebcf80eb5629ece63d59c63b597e62c32e85e76c1ff01095d605b3ac14f65c63f16619df93ac34d9471
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84