Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
12s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
view.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
view.html
Resource
win10v2004-20240508-en
General
-
Target
view.html
-
Size
83KB
-
MD5
6b92c6775ae8f622ddb7235b14934094
-
SHA1
83d3c43d1e44e7d3059f6b89497d8e6d084db236
-
SHA256
be4bb8b3a5255dcfd9f65de5f9249ad72a3f33db3aad1541936614e3917cb56b
-
SHA512
ca9686c63e836045eb4eeae49e4a8bdf6fd921cbc13a7d969e9c3749617eb9ba3c3ff3e39763b9d0dae5d405c8ac18c83184af0d882e01e717ab0c1d41a39eb2
-
SSDEEP
1536:/6nzVs49wetijlbztQFKFwCo0W1Wh+1pE:Cl0jpt8z0b
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 28 drive.google.com 29 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 1784 4508 chrome.exe 82 PID 4508 wrote to memory of 1784 4508 chrome.exe 82 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 3984 4508 chrome.exe 86 PID 4508 wrote to memory of 2884 4508 chrome.exe 87 PID 4508 wrote to memory of 2884 4508 chrome.exe 87 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88 PID 4508 wrote to memory of 1176 4508 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\view.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff97d54ab58,0x7ff97d54ab68,0x7ff97d54ab782⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1844,i,7826574989818670421,10349052290593039164,131072 /prefetch:22⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1844,i,7826574989818670421,10349052290593039164,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1844,i,7826574989818670421,10349052290593039164,131072 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1844,i,7826574989818670421,10349052290593039164,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1844,i,7826574989818670421,10349052290593039164,131072 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4208 --field-trial-handle=1844,i,7826574989818670421,10349052290593039164,131072 /prefetch:12⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4232 --field-trial-handle=1844,i,7826574989818670421,10349052290593039164,131072 /prefetch:12⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD593d0401fde9b9ad8ab2932f08668f5a8
SHA1dceeaa168e8479691322f641f3e263c72230f201
SHA256759701addd6ad56cb8c70aaf0a154687717b730967d040ebca9255e5c2e3f25b
SHA512b254f4ba845c9448e35dafcda348a8ce1c0c380d43e487baafc6b8df2d14c60f1aef88b1a65e49cf01b5931bfe4dd452b950f3da60bd55d647a47efae2293dff
-
Filesize
6KB
MD52aebc07c30b1646fa30866797a1eae4f
SHA110c55b0c5adce86de6c671997a0419f22c6bf29c
SHA256563badb85a5af3814cd9ac03b3279e589d638117004cbcaa7912c92351351c6e
SHA5120339b25a3b6d0410fcd353deb72c5de0a4d856fd7fe4ba2960cccdeef66a8bffc8dbb16e8adb6f93cc6b0ef78371649c1b776f35ab2f8103fcbaf07f1e952fc6
-
Filesize
255KB
MD56439a355ff4733d4a27a2234250ff9b2
SHA1cb2ce4648cbd6f1a86669489cad91e515a75f49a
SHA2567c95a5fecebdce7b829a699319356d24543d9766b0dadf907c9efa6487ddddec
SHA5128dcb2d83b2322f4d0e7407380bf57d0c831172cace4389042972bc23a3341ad24003786eb54e4cfdc0acdfed175cd48f60bf01626b054837772bb298b6e16155