Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 12:32

General

  • Target

    0544ce429a95ba5699c43d4ff5f5609f245105c82388296e852b5ad3e2ba7182.exe

  • Size

    2.3MB

  • MD5

    79893e931a1368ba6724110ca28247fd

  • SHA1

    c0ac618dbadc8862bb774746d4e6184354fa0872

  • SHA256

    0544ce429a95ba5699c43d4ff5f5609f245105c82388296e852b5ad3e2ba7182

  • SHA512

    3e06fad67a5bb4260fe4d13b208428315258a75f6f014bedfb8ae9544be3b6d1ee5cfcb22232729e9006f25360a5996bb6d6402990b4af742c578967e71aa75e

  • SSDEEP

    49152:R75gfdDlqnt41NdL7Lo45+5gYx+m+l6Id+csx+GV22i:hSqnt41P7RE5Zzm6IJu+GX

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • AutoIT Executable 19 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 60 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0544ce429a95ba5699c43d4ff5f5609f245105c82388296e852b5ad3e2ba7182.exe
    "C:\Users\Admin\AppData\Local\Temp\0544ce429a95ba5699c43d4ff5f5609f245105c82388296e852b5ad3e2ba7182.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:812
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcd2e5ab58,0x7ffcd2e5ab68,0x7ffcd2e5ab78
        3⤵
          PID:2828
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1952,i,5766851797443827500,3179165690803309434,131072 /prefetch:2
          3⤵
            PID:4348
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1952,i,5766851797443827500,3179165690803309434,131072 /prefetch:8
            3⤵
              PID:772
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2268 --field-trial-handle=1952,i,5766851797443827500,3179165690803309434,131072 /prefetch:8
              3⤵
                PID:2948
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1952,i,5766851797443827500,3179165690803309434,131072 /prefetch:1
                3⤵
                  PID:1384
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1952,i,5766851797443827500,3179165690803309434,131072 /prefetch:1
                  3⤵
                    PID:2268
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4028 --field-trial-handle=1952,i,5766851797443827500,3179165690803309434,131072 /prefetch:1
                    3⤵
                      PID:3028
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1952,i,5766851797443827500,3179165690803309434,131072 /prefetch:8
                      3⤵
                        PID:4428
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4564 --field-trial-handle=1952,i,5766851797443827500,3179165690803309434,131072 /prefetch:8
                        3⤵
                          PID:2032
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 --field-trial-handle=1952,i,5766851797443827500,3179165690803309434,131072 /prefetch:8
                          3⤵
                            PID:2860
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 --field-trial-handle=1952,i,5766851797443827500,3179165690803309434,131072 /prefetch:2
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4464
                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                        1⤵
                          PID:4084
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4256,i,18168883380598738769,14202261231630113808,262144 --variations-seed-version --mojo-platform-channel-handle=4180 /prefetch:8
                          1⤵
                            PID:3304

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            240B

                            MD5

                            f2398c202babae24fdcd71f728003193

                            SHA1

                            fd8ef7ad8f29eb0f37b335a5543476f813310749

                            SHA256

                            0edba084f7b43fa27bc52d1b69dcac0455be17b5692d22e4ffe535a806989a40

                            SHA512

                            401f60a67197813c25f6f2dfd5ad0b4f65b8ac4263524ad99f6e5242d1465fd9ca53dbc276b4bd249ade0a735abaa9b1cf8af2ea5d913147ecd85bc7858cc177

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            c0d4399a810b7a73f5bbe41d762cb3fb

                            SHA1

                            2805615eb2cc3cebb5cc6def7f979b0696af9987

                            SHA256

                            90bebe6158f05548034600cf2d078e7ebec014e634d6cec0bb2c0b135ac70ea4

                            SHA512

                            1b816a5d8ad60c2fe6c90b4f009cfee887c7b3775f8eaf156e6acc9bd4eebefc466850a861b6115f2ba316dd4b2953f90b1281d7fcc5eb17c61ce9d5a9dc9891

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            8511884394ebeb9b3290366d469e7305

                            SHA1

                            f062b0cb446416cafe4ede88bd9357ac514a8770

                            SHA256

                            b1280bfe771cde6f702023fb32cdf42fe75c234d4dc22845ff229d8d40c533f0

                            SHA512

                            b0e90a974622af965a72747defef31f87e88bc7753645578d41176be9abeb503794a826760657a6e1d30c44bb6f2d87f34d2557431445f269f601be8dd84ac5c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            692B

                            MD5

                            8479527bc381a481f1f292db98f66282

                            SHA1

                            f9ef63d550151f6f3fe3e27a16389d4a4601e298

                            SHA256

                            d1ab6a60e31c4e4e00927ac5be2f44510da46a3a1168e39de812f758ed4133c0

                            SHA512

                            5ee1396bf2d25f38a4532716d164c57c6ce12d14ee24f12b1857ba5391061e3a92bf79b089febf08b52668ec6a35fe16939167b7f32c05fdf4fd1bb50e237cff

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            7KB

                            MD5

                            7be2551c7d4297f026ba337fdd913071

                            SHA1

                            9367dee739c95716b475e0734319329bcf5b0f79

                            SHA256

                            cdd7eea7cc6af268b89b6f64456a8422c42b2c36613ec8a197548fedf03b5a6c

                            SHA512

                            c437daaddc5540ca528fed8c79fa324dd3ea5b6e7d0e31ec8da9533a51a00ff538470e9634b47c2d6cc0466edb6b3c72510184ef75a8f2a2b20497a407741d9a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            16KB

                            MD5

                            2d72e178614978445b6e5209a7bb67fc

                            SHA1

                            651c2c5c493e836bf3483fdbffafa5a9cd1105b1

                            SHA256

                            cf068ce377c75ff8fc2cc999ccda7d375ac999a0cc2e929e38d19553b37d9c04

                            SHA512

                            dbe9eef3b217a9f8096e29b9a17f8619fb6da12c93f5e2ce566b314dbcd9806909766bc38e4f6178cbc75015fb465322897c32be07f4feb706434572ceb97e59

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            273KB

                            MD5

                            6f1108acac0a988963016566cac59334

                            SHA1

                            040cdf2d6b6bc2b920d87403a7901ee68f592177

                            SHA256

                            d3da01a665b9f5259a7d5f9c54713a367c2b246fcd36189a8271777b8b57c406

                            SHA512

                            6828170e6a30d9636e52c155cdaa72d9656b31ae799e0980ab9db608b989975366ad9a2fb7718fd809c5ffe467ed9b72e73ae6babf1c64baa2aaa8e23025151a

                          • memory/3360-7-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-5-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-12-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-13-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-14-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-16-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-10-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-8-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-0-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-6-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-76-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-11-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-3-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-91-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-92-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-93-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-4-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-99-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-100-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-102-0x00000000002B0000-0x000000000081C000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/3360-2-0x00000000002B1000-0x0000000000315000-memory.dmp

                            Filesize

                            400KB

                          • memory/3360-1-0x0000000077B14000-0x0000000077B16000-memory.dmp

                            Filesize

                            8KB