Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
4Static
static
1ping.html
windows10-1703-x64
1ping.html
windows7-x64
1ping.html
windows10-2004-x64
1ping.html
windows11-21h2-x64
1ping.html
macos-10.15-amd64
4ping.html
macos-10.15-amd64
4ping.html
debian-9-armhf
ping.html
debian-9-mips
ping.html
debian-9-mipsel
ping.html
ubuntu-18.04-amd64
ping.html
ubuntu-20.04-amd64
Analysis
-
max time kernel
15s -
max time network
12s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11/05/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
ping.html
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
ping.html
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
ping.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
ping.html
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
ping.html
Resource
macos-20240410-en
Behavioral task
behavioral6
Sample
ping.html
Resource
macos-20240410-en
Behavioral task
behavioral7
Sample
ping.html
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
ping.html
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral9
Sample
ping.html
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral10
Sample
ping.html
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral11
Sample
ping.html
Resource
ubuntu2004-amd64-20240508-en
General
-
Target
ping.html
-
Size
85B
-
MD5
e7459a39621dceada643344b47fd50c9
-
SHA1
d1bf61e09fe44969fd613a495429c2c01138d887
-
SHA256
5804f8efc2a8f26bb4215869362257ecede59f442b6bdb50e7d6ec3146b874cc
-
SHA512
074f54ed8ef9660609282eda84f98faf39d0f0629a310f78e960f9c15a3e65f4272cd20a09f264e513f68a5a156392d4c54ae5546ce08dfb95f1c4789fa8ae04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133598659491523793" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe Token: SeShutdownPrivilege 1680 chrome.exe Token: SeCreatePagefilePrivilege 1680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe 1680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 4916 1680 chrome.exe 72 PID 1680 wrote to memory of 4916 1680 chrome.exe 72 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 168 1680 chrome.exe 74 PID 1680 wrote to memory of 308 1680 chrome.exe 75 PID 1680 wrote to memory of 308 1680 chrome.exe 75 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76 PID 1680 wrote to memory of 2660 1680 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\ping.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa4ca99758,0x7ffa4ca99768,0x7ffa4ca997782⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:22⤵PID:168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:82⤵PID:308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:12⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:12⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3912 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:12⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3576 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3272 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:12⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3792 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:82⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5272 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:82⤵PID:508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5384 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4112 --field-trial-handle=1796,i,9908065385763750197,8373003376443101863,131072 /prefetch:12⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4328
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2841⤵PID:3624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD58e206af0af6d736ecc18934fff2e29ed
SHA1a65e44e9dfe80e482e4a51a3eeef09f0d1451aa3
SHA2560664adcb6f10ffe22963e2d48fa8e2856ca8a6e96462d005e3d2a27c1b288580
SHA5126ad1e23a647bb1460a9246528d3578aaf570e361dbfacf862afa55d3d4eb836c039bc191a1d271761693f3a9934a73c30b8d24e3fcedc18f153cbfc0cf1fd762
-
Filesize
5KB
MD5797dbd43cea33ac24a006c1c7ce267ca
SHA1d7872a692b8c640877e82eaf83c28a56fd469b43
SHA256c6ef9e274d9d3acb51bf0fabf8a2c48fd89afe662b11d85b982597ba54d384d7
SHA51288106272255530bc9357a479e87a9d62090cfac9fb603c7a07afedbe36b17e5977aec72295e31bbceadc6bebc1c50d65903465fef297a0093084875063a1d730
-
Filesize
136KB
MD580564011f60ab34286195f28fd4df1c9
SHA19f74072cba04c688c60fe503dc548c1908743e38
SHA256bb3007c62053a07a433e47c852ab8f5348503e2373f6d23fba53571bac558e7e
SHA5123a72c0aa1353be623607a3e1a55d47afa111fa4e9cf3d66964957ab1b1b07af5ae38dd2e7d010a2707da352791b742f294724db42445a103728b32c881252106
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd