Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 10:58

General

  • Target

    https://prefatorial-bennie-7192c6c68663.herokuapp.com/b?y=49q24eh2c8pj2c9o6tj3eoj4c8rm8pb274qm6dhj69h3edb169hj8p1m6oh2o8ji48t24q3keho76ehf5tkmsorfdppmur31c9m6abbnc5j6cr35e8mjac3275hjid35cpj66dhed1in4rrbelgn0s1ecdnmqbr27tsjqd1pe4p38pb868rj2q3d6hij2r1m75jmke356com6e3gd8r66shkcdjn4r9icdk6uor3ecr66ophd8r3iqhjd5i6kdj3ctk34rpod9kj8e3k68q74ohhcgqmqdpoe9o72p9pd0r62sra75im8qpk61q36pj5dhk6qprfe8omaeb9d5pmusj6chlmgc1t7kujq8g=

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://prefatorial-bennie-7192c6c68663.herokuapp.com/b?y=49q24eh2c8pj2c9o6tj3eoj4c8rm8pb274qm6dhj69h3edb169hj8p1m6oh2o8ji48t24q3keho76ehf5tkmsorfdppmur31c9m6abbnc5j6cr35e8mjac3275hjid35cpj66dhed1in4rrbelgn0s1ecdnmqbr27tsjqd1pe4p38pb868rj2q3d6hij2r1m75jmke356com6e3gd8r66shkcdjn4r9icdk6uor3ecr66ophd8r3iqhjd5i6kdj3ctk34rpod9kj8e3k68q74ohhcgqmqdpoe9o72p9pd0r62sra75im8qpk61q36pj5dhk6qprfe8omaeb9d5pmusj6chlmgc1t7kujq8g=
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3668
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99039ab58,0x7ff99039ab68,0x7ff99039ab78
      2⤵
        PID:2552
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:2
        2⤵
          PID:4900
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:8
          2⤵
            PID:216
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:8
            2⤵
              PID:4324
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:1
              2⤵
                PID:772
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:1
                2⤵
                  PID:2012
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:8
                  2⤵
                    PID:1680
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:8
                    2⤵
                      PID:1236
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:8
                      2⤵
                        PID:2844
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:8
                        2⤵
                          PID:4320
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:8
                          2⤵
                            PID:5084
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 --field-trial-handle=1924,i,9975443036778180999,1823810381777676515,131072 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:680
                        • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                          1⤵
                            PID:1052
                          • C:\Windows\system32\OpenWith.exe
                            C:\Windows\system32\OpenWith.exe -Embedding
                            1⤵
                            • Modifies registry class
                            • Suspicious use of SetWindowsHookEx
                            PID:2196

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            e1de0624d0f6fc34e16a311778f0c476

                            SHA1

                            53b521ebe3c9fa67dc062b6267a7720be2b8a866

                            SHA256

                            0f18b09e426797092a126b04267d1d23506ea4a39dfaf5465d2719bf35648e8a

                            SHA512

                            a7f5a562bf647af4a75040a2492b988ef6d34e3aaa11beb422c28ef3afe84c710ebaf718e56e0ff8b94abf1df3c53a32a2d14e4cce8057672113583b6c9aaa14

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            522B

                            MD5

                            25fd3790a5405e62b796b143112a6cb6

                            SHA1

                            c52cfc51e254aa03a3f29be7a164c643091e7d10

                            SHA256

                            58b6d3888d56abb84475bb37adbc89683d2194714ad14fa9790dab5ea938b3cc

                            SHA512

                            fde103d5aadbe905cc513a17d9e7c0906c11c0a1e338ef2ead59eb5f46559e6c1aa774f5f5a581fa51f0ceafaefa4588986194b0872a15fd37401911de7f1a69

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            d902fad8b5b2521bb5e6daab6cf37ac1

                            SHA1

                            cb47b4dbe5799b123bb495bffc6c5544d2b7deaa

                            SHA256

                            af4d47458ddab900c623cfcc21b535b5dd031751ec4cef487c9750267043e147

                            SHA512

                            283907ae3c52caf923216375c55a80730d388384ae7187df60096c8b11a3730f5151cb5b42d014a679687eba46d173b45e67245859ebee08ea7e6c6c66b2e39e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            257KB

                            MD5

                            35de0a21de5021bb62fb17c036d2e91f

                            SHA1

                            6c6aa8399806c98d330eec3da661423c58f5e62a

                            SHA256

                            49a80a923a18686941771a87dbde90df978347faf4a71a562e57463393469a46

                            SHA512

                            0dd44276dacd7cd30ddfbc8f251bc787a087a06d05f60bd55ab1ac53ccfeb0364b54874fd1d35512b158a2299a93a439bdc6e1ffe1918856e13f8f23bb151042

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            257KB

                            MD5

                            17dc1e53169c4a6d95290668ed78b3d5

                            SHA1

                            35ffedbd21d95e92527f433a3a47a32797be3553

                            SHA256

                            d584869f8d5d30c9ca2ef207996408667fefaf6027789e78e6456da575772521

                            SHA512

                            d90d7ed553eb0dd503693bda93d4916c064352a248f0ce5222ce26a80d8e55043697696f80c3df634795f8e0e1d01c6ee9c59643c5626b8144bc984202a4c740

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            257KB

                            MD5

                            209e6bfa1c087a4ea75a774a788aadbf

                            SHA1

                            265fddd6ae185769a3b334bc93592b9d3e038305

                            SHA256

                            75db144f008511fd4e60be976904146658915a0ba5b1e7646e9d25e1f2bc15a9

                            SHA512

                            4f6d54f906c856705fd893a343663345523536f1f72f628b8fb94160f814cea54daf7480377f70959544b0f7359560a06b01b0a19e665488191ea39d1fbf358e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            277KB

                            MD5

                            eeb09d2a97300f52a0ab6186fa66be3c

                            SHA1

                            821d057b1aa890eb9d56430d0c473a868601f9ff

                            SHA256

                            8cb0b5b7e3eb4ee33ae851dad3bccbc7019dfb0cf13bbde78152176f2ce9e0af

                            SHA512

                            295ef24c1e286d5ce2176e58fabbcb9cde8d69b1a6f8c2a376729acaa0fdc888db5407b0a8f4e1cab4eab9d0415eedbf3eb48c6d6e1ab58a31dd3c26152332ee

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                            Filesize

                            100KB

                            MD5

                            e917472ea10a091f055e74f36f4fda37

                            SHA1

                            7a46f4251da820f42fb56c3a689d645ded802b6b

                            SHA256

                            93fd00522d952b2aa4e7f1662b7c94f08686c6e5db1ce79c2fd5d4867e09df68

                            SHA512

                            0f28e141fc477533beaca99fb1d7da401a9dd47e8febff51733e4531eedad21f5242600a0272390e23baac386c18179747ed5b5be425a4c3ffedbe3f0071478b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57e2ee.TMP

                            Filesize

                            97KB

                            MD5

                            50f5ec973b5600761c5d09350cdefee6

                            SHA1

                            4377c0a287a5c9b359d8477ac2de9018946b3bb0

                            SHA256

                            2757d47d2d8efc1315b37dc63934c106cfc5779f1797d4105e4560b6e07d7f6d

                            SHA512

                            a62b83e8773cd156958f35474b06ed8769dba2c9d498456208c65d213e903256d9f0d8a1b7e15977c79993fd77ba3e90a3eda9a7cb20d2b5d8c408af7fe8b9b0