Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1199s
  • max time network
    1173s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/05/2024, 20:40

General

  • Target

    973816.webp

  • Size

    63KB

  • MD5

    d3afdece336124c76401eef4f101c9cc

  • SHA1

    d301e492c2b7a58d864e4a414fc4e728eff21acd

  • SHA256

    a3b0b7e3d366d24fb885fbdd4cc261599d36d25e7aa75279eaf8b93b68843b46

  • SHA512

    115d4fb56cb1783bf0aa8bb906069b34a684d54ac86c9a16cf04ec946a1484b679cd00574b781c7d4ff4359092d1badc8feb697b9b4b3e2d09a967f23228b519

  • SSDEEP

    1536:i+ntlAfCfqn/kgaX4cDGMaQ/+iCZ60b8j47ARDu1NF+yf:ttlAfHnMgaX4cSMaQ+BzIMkRq39

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\973816.webp
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\973816.webp
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3356
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa861aab58,0x7ffa861aab68,0x7ffa861aab78
        3⤵
          PID:3188
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1776,i,2261654862937207250,15820179969107463634,131072 /prefetch:2
          3⤵
            PID:1604
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1776,i,2261654862937207250,15820179969107463634,131072 /prefetch:8
            3⤵
              PID:2968
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1776,i,2261654862937207250,15820179969107463634,131072 /prefetch:8
              3⤵
                PID:944
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1776,i,2261654862937207250,15820179969107463634,131072 /prefetch:1
                3⤵
                  PID:3708
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1776,i,2261654862937207250,15820179969107463634,131072 /prefetch:1
                  3⤵
                    PID:3656
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 --field-trial-handle=1776,i,2261654862937207250,15820179969107463634,131072 /prefetch:8
                    3⤵
                      PID:3916
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1776,i,2261654862937207250,15820179969107463634,131072 /prefetch:8
                      3⤵
                        PID:2044
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4572 --field-trial-handle=1776,i,2261654862937207250,15820179969107463634,131072 /prefetch:8
                        3⤵
                          PID:4568
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1776,i,2261654862937207250,15820179969107463634,131072 /prefetch:2
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4520
                    • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                      1⤵
                        PID:2700

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        2KB

                        MD5

                        1cdad0b441ae585b8c0480dda6ab7bdf

                        SHA1

                        59560523dcbd3c04e91220c6c8442c4f7b360c9e

                        SHA256

                        5d53f0982bad5a2cff11c5f6fbde069e84d313f409ce6adf25663e47ea2436ef

                        SHA512

                        b39b7e2bd64ce616117b6941d9087d4ca4f5b5aefbf1a2a9e48e2a480daafc7a94b42a51729c43cdb7a2d73f75837b9489efe1a91a17feb3b1dc33e5bd15e8ee

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        1KB

                        MD5

                        846a70c53fce7311a3abde33f1bd2dba

                        SHA1

                        27590b48925941e46ae7c2f0adbbeb5c01021966

                        SHA256

                        7b378b61e3105e81f005b76220839b4b90c9aff1840b23716a4895e84dc24dc8

                        SHA512

                        c5baed039d357f49ad19278c420a15052d8593640f609c0d5edaff16e615c02e2876904480aa7c48d9bfab6b01f4c605feeea9aa8fc60f225e176f2547cc8a41

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        2KB

                        MD5

                        76458e9639a1d33facd8137c78216843

                        SHA1

                        1e17585ed1941ed79bbf618bbca143bafdca4b6d

                        SHA256

                        456e45e0c4cfccf5c0f90d1350df8344d88236dbb9ebe555df23754a9d661c06

                        SHA512

                        aaf389e9ad2c11b0a568a46e5d7224eaf308156b4571d69969995a462b64aacaa7165eda19446b60fdb45b024ea64455c0649afa7801d459dcdc8bff89f4b4ec

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        ab9c512769538ddcd716205c3275e953

                        SHA1

                        a3a744cf6fd76614bdc816637aba7930a58daf52

                        SHA256

                        076bb510c323c3aeb3df73ca911e63d78e0e233745e54a550d2f0430744393fa

                        SHA512

                        97d83c94a40a90797b2468748db8cbdd9f8978b9e0059fc79acefe26516c988ea5c4aee932ef22a005f47cdc99172075e3bfd11976b12298a9ae14a36e5fdc29

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        16KB

                        MD5

                        da15303de8d881d0dfbab52736ad665a

                        SHA1

                        0bd5c286f60b859f18d6d697f948f9d8847f3e7d

                        SHA256

                        d0462778c41821768e6dd57c751d6dee2c15df4d098eaf11c3b1a4a0b2bf8f5b

                        SHA512

                        3ebd843534cb68a844b816aa2424d27d02657175f7fea749cb9dd915f98484b9d8ce16e9b0f2d9ca8e25da4093ff1ed49f14548e24a9effec48f17ae7ab53938

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        260KB

                        MD5

                        a6f30c886dac94ea4f79372ce28ac2cf

                        SHA1

                        f8205dd29c31f2d01724a13d2cb4afa0c77435a7

                        SHA256

                        e763aa1ff15a2b545bc9a14c27381241e11b59f8b1c2eb026220558402427001

                        SHA512

                        05b8b762c0641602d512501f9f4e11e76a52a3eb4a336db57725dc554ffef4c5217ffd14e5d196dc5136898c261ed1cdc19a61148f4103cfb0b613ab10aaf3c2