Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1200s
  • max time network
    1175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 21:09

General

  • Target

    https://membershipworks.org/file?mid=66422e2a98a3b4aa0b065de4&fnm=ParkingDirections+to+Imperial+Ballroom.pdf

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://membershipworks.org/file?mid=66422e2a98a3b4aa0b065de4&fnm=ParkingDirections+to+Imperial+Ballroom.pdf
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1b97ab58,0x7fff1b97ab68,0x7fff1b97ab78
      2⤵
        PID:4656
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:2
        2⤵
          PID:3384
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:8
          2⤵
            PID:3964
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:8
            2⤵
              PID:1152
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:1
              2⤵
                PID:2616
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:1
                2⤵
                  PID:1452
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:8
                  2⤵
                    PID:4664
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:8
                    2⤵
                      PID:2368
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:8
                      2⤵
                        PID:1660
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:8
                        2⤵
                          PID:1924
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:8
                          2⤵
                            PID:1884
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:8
                            2⤵
                              PID:552
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2488 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1768
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:4732

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              97a3017b6490b95d69b88016ea151675

                              SHA1

                              4c313a1d826556cc02ee25dcbcab27f0fa9e3a44

                              SHA256

                              8b91e561da9da210182a27609ca45a015b059d1a1063c5bb3e0e3359cf52e32a

                              SHA512

                              db37e0e3c1e56cf243fe641e0903ef84cb82ba93b5c611dde137655dbb5917807cdf061435ad10c5b24c24c42b41cb2e4bd4c7d3a9d84e50370bf36914f44f36

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              7KB

                              MD5

                              180fbd5f1b6a3fd1c26cb39f26336241

                              SHA1

                              546b8aad4aca368cb5c436f17c3038fff415b76e

                              SHA256

                              1bed636a83de5b4011b3662a7d7b7be71c514165d8d1eefa8ee1f274271bff7f

                              SHA512

                              90c9b3336d8d73ba18ffbf0c788854b281801d6f564f507518d89710370699bea63c4bd4a0657cfe6040c06e34f9a441ecce8b88d733f76b7473505dca3aa19c

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              132KB

                              MD5

                              d7ca29d148e697908f921ecec6b7012f

                              SHA1

                              4a02f2bc6332e517b78ddc57bfd4591cb96db089

                              SHA256

                              bc849c91c9e23c63978783bec52aa67ef6b4d21dd4e47516f2e8d28bc0c4cad1

                              SHA512

                              56a12dcbb3e380820c1e79c6da6ffc3467139d40b11ec5aad14ce63d93ce96a3bf3eb12ef518926cee3d8eb4755cd0bb32ab36e3170a669b0b91e976bc0363f2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              131KB

                              MD5

                              80936ace56bd37b9f39b5f747136d90c

                              SHA1

                              acb84dbdf92933bf3d06a7c2bfc70b9707002d77

                              SHA256

                              b397fb3e85f21ebc5497212a39acfa70cafda73522aebeac1f7fcf062f49de45

                              SHA512

                              72bf2e66ba8b9dc177276802008263e25fa503059c7db487e5f08d371762a934b9e4dd6bb825d3b5f015e567adbe634fe455d82e1d939d6ff328fd14a6afa567

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              131KB

                              MD5

                              e543dc047c70f5cadc095453074f3e79

                              SHA1

                              8219b758318466898f48a0630694453a144be646

                              SHA256

                              ff68f659f944e7333c0f08f2c32c75c4776646063f38c2a2ff779979ca9cdfc8

                              SHA512

                              efe4eb4fa67524059e801b0dbfed4dd879425e9a76bcb3d73f3e1fc7a678ca5664e953576423bcbdff62dbc6a1627b21a13088f73db138c973f8036d0f5cd465

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              176KB

                              MD5

                              a06bceba5b22ff8550bbfa30bf5a8870

                              SHA1

                              a68f2d9d6a70e315ba653ba806485a25432363e7

                              SHA256

                              3df7dedcc24e88c9acacf407f6a2ac6630615310ab67455c558dc343de54df6c

                              SHA512

                              e646f6f17792f05e1e1398e448e5069178f4fcd1b4fd313bda8ccedc0763021938e2942055c9a33b9a4cd47a03c59ca8981a979e02b381266706125ec81b73ac

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                              Filesize

                              97KB

                              MD5

                              d482bf7b2e43000bccb7fb046c8c71ff

                              SHA1

                              b158e4ee0d4ec7f3d28f954d4326e544cc3e1acb

                              SHA256

                              21b4ba26cebb11aa8ee4e9749724b6766d79dc692728445e8ed9f995272d6100

                              SHA512

                              2fc4ab368124b56242e0a6712a8e765c65895310726d19258d687036ee6add0ef7391e469ed91e07547e1f2aa57ee661b6a92587d8ee4a51935f1967477cf8dd

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57e1c5.TMP

                              Filesize

                              94KB

                              MD5

                              0841be8860b6fc94949797a0a845c008

                              SHA1

                              f56d78b6f097dc5aebb4b751f423031792ce7f2c

                              SHA256

                              2bad29ecf70249477eeeb48f3f9d60837e92d209bfcb58641e2aee8f9e9034d2

                              SHA512

                              2a7564d74cf18482f150ddcc49fdbf60500f45c99b0545dcc106710c01482db2537e5288ec8fbeb496a1fc6706cccf7733102712ec6e189a2b921e439de35636

                            • C:\Users\Admin\Downloads\ParkingDirections to Imperial Ballroom.pdf.crdownload

                              Filesize

                              166KB

                              MD5

                              504f35d6f746273756883095c3b774f1

                              SHA1

                              3ef435fc797eaaeb1fa3610e817c916b323ecfe4

                              SHA256

                              29a190d0f62a80c9815e85cceca26687e840f6f063722e2bee7ab27167e66d8c

                              SHA512

                              a92d368284e8c97549bf8f502d08777533f96ba4ee718badb8410877cad86072c59b9c48012361fe3723df65057b1589aefc5f0bf6608e7e81e0f97d5d5689db