Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/06/2024, 21:13
240610-z2snda1dmj 510/06/2024, 21:10
240610-z1d4la1cmq 410/06/2024, 21:08
240610-zyzbrazfrb 1Analysis
-
max time kernel
22s -
max time network
26s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/06/2024, 21:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/J7UAwYCI#acftDB2EEfo0kf8m0zooHORXKl05GlSs9EAuLEjjKH8
Resource
win11-20240419-en
General
-
Target
https://mega.nz/file/J7UAwYCI#acftDB2EEfo0kf8m0zooHORXKl05GlSs9EAuLEjjKH8
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625274618776400" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3144 3592 chrome.exe 76 PID 3592 wrote to memory of 3144 3592 chrome.exe 76 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4440 3592 chrome.exe 77 PID 3592 wrote to memory of 4900 3592 chrome.exe 78 PID 3592 wrote to memory of 4900 3592 chrome.exe 78 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79 PID 3592 wrote to memory of 4252 3592 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/J7UAwYCI#acftDB2EEfo0kf8m0zooHORXKl05GlSs9EAuLEjjKH81⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb850fcc40,0x7ffb850fcc4c,0x7ffb850fcc582⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1792,i,1069699218517723940,13602707888491532824,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1788 /prefetch:22⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,1069699218517723940,13602707888491532824,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,1069699218517723940,13602707888491532824,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2360 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,1069699218517723940,13602707888491532824,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,1069699218517723940,13602707888491532824,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4476,i,1069699218517723940,13602707888491532824,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4512 /prefetch:82⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4704,i,1069699218517723940,13602707888491532824,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3240,i,1069699218517723940,13602707888491532824,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3712 /prefetch:12⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4748,i,1069699218517723940,13602707888491532824,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:1092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c60ef4bab9b023bc25e400b1fb4fae1a
SHA1de7f246ba39bb3127fe9c7a8dc94d2e7a414875c
SHA256621eca3a0cf9cee861200119059c80a69fbe6e18223a9f15c7a9d6d628009c64
SHA51276847fe56d2940dcbe4632edea653d62a139bd48bfe26440e393d027aaab3b9f6748c3e7bf7ce4a0d7b102605a68d70055ccfbfc21c4e123677110289fda96fc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5cdcf6b245e2ff596562baafeea3c8a15
SHA193f64b5a1ff0f31d4703a613b499fd52fd83515a
SHA2564886034e0cbdae6fa74cc099f6c82a37d7cd2f833bfbdf2ebd8dc746618cdce0
SHA5121d6dc23ab9343c27ba8f8528d9ed3bd014ef0db81a9547f806b4e57cf9d0e5a8e694f73741f28555f7fe3a9870866c6b13b1d48f3d991df92091ed21ae809ec4
-
Filesize
77KB
MD55c500c1ac9f9179e0a3340bc0b055fef
SHA1990622b068c4d1b3126e120ce5ff967978f5dbee
SHA256263580841bb8c47a3fd26e3d5661202690ccea3a0275f010637c7b4ecb448779
SHA51221bdfe64d4052505d7c99c963366f34ea323e1ed3abb6520a1a8bf603b58b7daff399e6770855b608cb1ec60308e1e06dfdd98728b983c8faf48c26d230bfc9f