Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
20/05/2024, 20:16
240520-y145cafe28 120/05/2024, 20:14
240520-yz6lsafd66 420/05/2024, 20:00
240520-yq2w8seh38 1Analysis
-
max time kernel
100s -
max time network
212s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/05/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
PO, QU VT.html
Resource
win11-20240426-en
General
-
Target
PO, QU VT.html
-
Size
709B
-
MD5
5e1654ff0c06711666b4e55ccc214576
-
SHA1
4eaf9603cb5fe445905d7c359474e19d872a930b
-
SHA256
4e19c51413928aa8172dde82c5a8b10f2e9e2cbbbb6536dd9b142de3509c9461
-
SHA512
29c893b08260b261adb1130137b3c28d50a11b2a2223b4c8770d0746979293079259ce0faa6f306f5d59d20728f7265c5394561de536fcae5d89a461d6fdb406
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607088425796325" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 8 3096 chrome.exe 78 PID 3096 wrote to memory of 8 3096 chrome.exe 78 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 424 3096 chrome.exe 79 PID 3096 wrote to memory of 4988 3096 chrome.exe 80 PID 3096 wrote to memory of 4988 3096 chrome.exe 80 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81 PID 3096 wrote to memory of 1108 3096 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\PO, QU VT.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc0b5cab58,0x7ffc0b5cab68,0x7ffc0b5cab782⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1820,i,11389398821150589015,17208598731966598066,131072 /prefetch:22⤵PID:424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1820,i,11389398821150589015,17208598731966598066,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2160 --field-trial-handle=1820,i,11389398821150589015,17208598731966598066,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1820,i,11389398821150589015,17208598731966598066,131072 /prefetch:12⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1820,i,11389398821150589015,17208598731966598066,131072 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4316 --field-trial-handle=1820,i,11389398821150589015,17208598731966598066,131072 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1820,i,11389398821150589015,17208598731966598066,131072 /prefetch:82⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5db60c5f70b122cc172c8f394c23c84ff
SHA1901ac34e427ce6a3904fe4d655718ee41a7cf266
SHA25634f4c576d43096e31fec2fa3766bdfaa377f99a26dd2ba11206a20a7484fc5b8
SHA51208a38c905a93703768a1a67b1c257786a9186d211eb02d9f944a7252a09cf8c808d0f3770046401c3f009d4b42499efd824856c07419580803eee105015ac055
-
Filesize
1KB
MD5341b5408f38a2ac40a7f77f59cdfb494
SHA1f525918f6e55eff5062ec11a7ecfb4cbb0dd38a3
SHA25613e4ffe646b866788ea4af2b37d5954e775bcf03a554f726974fb9b4710edf67
SHA512c54bf92d51f5afc61c96edbc534b79d7cd5769d7fb3b6f5af7a18344f52feb4540e69fa3aae5b787368b01644f8faf1cb3c8f13a2bf51bbaf39716ee1b4b2508
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5bb7e28ebb6addbc246f120fc0c267b9b
SHA19bfce7f57559b7c11c9722eb1bf0b27f399261d2
SHA256521f9af4db9a69e35ddaacd534929e24257be884cceba1be9ffd182f37851df8
SHA512a260df2f88ce0bcac9dd90745b96d29fe1c97678f9042c06901cbddef43dfb900e8becaecb0a361104e56492a7a221242df33552fcd668e147a574bba071d4c5
-
Filesize
6KB
MD5259b09260cbf17bd16d53fdc4cba3631
SHA121ecb273526283a47759a0b5977d7f8026c397fc
SHA256388077632a2a9f1cd5dad684c48be25ba691d04274bdd146f86991f748faebb3
SHA5123b8b69b29a6484215518930da6fb71cccab60f569b81b04f661d6ac8916b3651803f5190df591f7d4ce9d9b068872953fc1028d61cffd37545ba6e0747ac82b3
-
Filesize
130KB
MD5b785761cc37bbd03db20cbac41e82976
SHA12e74dcba142d491a011b6fe5d328e74c4fb21ec0
SHA256611ed6f4276ab2ba16f195f3641c8e6f8a82fcf80bc5aa46a14e973c8d1310e9
SHA51283a7623a294dccec70803283e7d7efe5e351cb1ec90eec6366febd6fbebac73c8a83ef9f487285ff664edfbae718659ef13e7e9f6eea971f1b5eaf0ca15b76d1
-
Filesize
130KB
MD58771cab348061514f6d84208b9d05e59
SHA1039ef92c71709ced63ea4ed45b34049bc534f349
SHA25644fceba72e54a90b8203a3f366f6faf2cf4e9f1ef9f67673830fe21db7ce40d5
SHA512c1939c9a8ab9e7a53767cabf796d5f49ba938a646f2a4a523d4b08eb06f32f6e77428f789b60eb0553e65eea7df287a89f25746c3359d7f392e3ad9907b08f23
-
Filesize
264KB
MD53e578eac5c411efef9f59b6a13a566f9
SHA19838c59e14c6423bacc06ea52b83a71d2ebd722c
SHA256d095f3691bcc5bbad15c7ab0c98ffa53e6002bfdea3aa51c6c2fb7fa29c97e5b
SHA512799293e745c98e0cc85690f2af099b6f442f5d95d783d8af9198167319c8c8d5aef9471226fb1b1deb394685a7a75cd37511db8e79661c037b6ad694505aac4a