Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
256s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/06/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
HIGHEST.html
Resource
win11-20240508-en
General
-
Target
HIGHEST.html
-
Size
81KB
-
MD5
6f7d178fbded91ea71c9971ae14c55c0
-
SHA1
035b84fbacb2547009f73f2c539948f39c7b822b
-
SHA256
3ecf7a7124ee6639e2355757262903b9b2f548c32cf5be2fffdae9b06c51beb9
-
SHA512
bdfe388c6ce3f0b3ade83809204cfe166619d308e65b011ebe59a9fd8cd77716205b3c03128774082ffdb849ce03ba837bfd3e208b1b7bea36eb6c0028d29be6
-
SSDEEP
1536:ED8qouIsoQCzrDTuUtcfPwmd0MQqzNsf7/p4Yt+hLcJiG6DktCKTtQWu:gh7w+N3DXGtQF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133623207568924498" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 2704 4852 chrome.exe 77 PID 4852 wrote to memory of 2704 4852 chrome.exe 77 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2020 4852 chrome.exe 78 PID 4852 wrote to memory of 2988 4852 chrome.exe 79 PID 4852 wrote to memory of 2988 4852 chrome.exe 79 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80 PID 4852 wrote to memory of 712 4852 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\HIGHEST.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdb43fab58,0x7ffdb43fab68,0x7ffdb43fab782⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1772,i,1242515788142258044,1421532361689229512,131072 /prefetch:22⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1772,i,1242515788142258044,1421532361689229512,131072 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2144 --field-trial-handle=1772,i,1242515788142258044,1421532361689229512,131072 /prefetch:82⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1772,i,1242515788142258044,1421532361689229512,131072 /prefetch:12⤵PID:72
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1772,i,1242515788142258044,1421532361689229512,131072 /prefetch:12⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4232 --field-trial-handle=1772,i,1242515788142258044,1421532361689229512,131072 /prefetch:12⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1772,i,1242515788142258044,1421532361689229512,131072 /prefetch:82⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3976 --field-trial-handle=1772,i,1242515788142258044,1421532361689229512,131072 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 --field-trial-handle=1772,i,1242515788142258044,1421532361689229512,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5e049307644ae06d22ef9563e2743f36c
SHA1767204fbce462208105a83e7bf05e060a56c3a00
SHA256fbafda7326695fc5041845010353f6092ce1bbf3f1bd9d1dcf3013a3d805addc
SHA5120087031548c6b916187eb6d91b74b806cee5db9b36629596d997a8d31a8f46addb035fc59042c8fcd134c666a3d5c10b114405eafd186b5f2f72fd4f16b55d18
-
Filesize
2KB
MD5c7bc523f1c9e59c2f7e293cef290420a
SHA17282f4fedb81d2101c28b65466deec1ceda91799
SHA2561c8466852741ba4b74ad55f19c1fbfcd5f59bc18fe9e52104f2d443a2fb12548
SHA5129f3313a440f3a294e9a863dcbb39660563208b6ea158b20d6d304252d5b2a0d2cb218a149619813fa36a3b28d0bcdf8eb7f065673f571c16a59fc57aab40b72a
-
Filesize
2KB
MD5d52e4f4dd51a560d802f116ea537c832
SHA1c19b8e965c93c295f390b7bb52f46fb0dde13205
SHA256f9e40f215b5e48ee4b09ff11244670d1cecbe7411c2548891f36dd53113597fc
SHA512e54f328af7e2d51b291c5c46162fc3a7818e551c346aff606701bcb9dc278013b60c50bf315a03f3cf1f9e7fa5e0030aaa92939342d06b8c9038bcf220169af8
-
Filesize
2KB
MD530bc10c29d53822a8ea10515eb17b2f5
SHA18fd8ceace74f43a0bdee03a36f4fc0d64df40457
SHA2567ee97e72d69b47f8533d75b5050ffdca179314990b0034ad7889c6c0dc603ae7
SHA5120c05c19b74f0730f184a69a42c1f31343ff6186b5779552c10d27d99c0933d96273389792eb00503d4b5b118aeab9b2b86119aa07268c8485396c5c022c6491e
-
Filesize
2KB
MD587081163f378c524793f44bb1f62d0bc
SHA1d50c94dee8bfbc2a556f52250a469ce42f54bf57
SHA2564cb722ca4012a860734b48fe4a2d0b1a5a82b2e37bd758164c6bdfd7adf6e3fd
SHA51273160f2d80c9b671a68160734bcdf05b71f623fda897d110aedfa8d005e3bd88abecc74da888ef6d12ac42dfadafec01d7c083c76b8693360813d46d88515dc3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5057c11c7ebf16fdca1e103350e509b4d
SHA1d2de58596cc028079347d8accdee96a13208db3a
SHA256653d04d87fa5fbed0daa12bec4e061da3b480c0c4541a1fbf22cdfbc56b81a4d
SHA512d2bf57a45c411a0820e249ec96fec64a0bcd2f9527f2f1fb20be8e4aa2078842d0f51156983a198509553bcac8835df3ead7e7c1a63788237e41265b44063794
-
Filesize
7KB
MD5351c27d8dbbfde0eae9c6b361684925a
SHA159a039f0c82de69aefe6b95073346a8969ab3dd0
SHA2565fb738451e39e6e24e62949058792f83e793b7baaada3fbb4bea2f99c1598e07
SHA512107a45296b3af8bfc355534ec8ccc946d4905f2661adf9966d6f20f0b7f503b93174122f2d663df199b959c127964937d74bee3967b52cb4405a9c73cdbdcef4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize120B
MD502aaf23e5e25305793b272166be54d65
SHA19a9067a9f5f6a11497e5f0f7dae2d3885013aae1
SHA256cbdac2945af39e56b5ebad6fa6d14b73fa5c628040b2a3bdee9cadad3164d712
SHA512af50a542ef14402f755a7faf4864ffd776b3ed5c0b9d760c89086a9952163390d6a4ce3d353fd6c209c673c714b5f9d1bf36321c4457db29ae1ea0748bc2d3e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
Filesize
129KB
MD51f6f1e03c1d6e572e8a6a28923cf3a86
SHA18ea0ed102494778e0a77e74b5c193906138d1e2f
SHA256ee5b2b6036e9f36fb086d6e374c9406cf2997a78e943e1b24734926a03c5eea6
SHA5128c87c513059f501b3b8fc10da8faa58648bf595c237e5393944d022cab2d8062b2d70ef4a4814b526cf03e5bcd4f41324eb98eb19fd23dd9442b2ed2bf0b3796