Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

29/06/2024, 04:37

240629-e83fya1crc 3

Analysis

  • max time kernel
    299s
  • max time network
    300s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 04:37

General

  • Target

    LoaderC.exe

  • Size

    24.8MB

  • MD5

    167ad54828fff3b030106f1eba3a9a6b

  • SHA1

    e7fec5ae2975a981b5686ebd951322a148eb2cc9

  • SHA256

    238ae034d69064f92903a8a10c3d4cf0c2b8a2179439d6c314b381bb8b4e6770

  • SHA512

    44e2ba7e5cc546d147ad04b91ec6583bb073412d28819534830a58a2e94d5bf8928c613cf7d90ae68c2c71388774425c757ff44f9d5b54acfaff6c4e5a6c68f0

  • SSDEEP

    393216:HdXrv383b374H96bbcMQdn/CMOr4St7IKYHB5xxmmbDX:9Xrfab3EH9iJEni0WXaxx5

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LoaderC.exe
    "C:\Users\Admin\AppData\Local\Temp\LoaderC.exe"
    1⤵
      PID:1800
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3760,i,15140928051103392835,1612840580898364401,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:8
      1⤵
        PID:4828
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:380
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcad52ab58,0x7ffcad52ab68,0x7ffcad52ab78
          2⤵
            PID:4128
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:2
            2⤵
              PID:2044
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:8
              2⤵
                PID:880
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:8
                2⤵
                  PID:2160
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:1
                  2⤵
                    PID:1964
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:1
                    2⤵
                      PID:3312
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:1
                      2⤵
                        PID:4036
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4528 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:8
                        2⤵
                          PID:1120
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3644 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:8
                          2⤵
                            PID:2692
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:8
                            2⤵
                              PID:1544
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4644 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:8
                              2⤵
                                PID:3976
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:8
                                2⤵
                                  PID:2128
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2276 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:1
                                  2⤵
                                    PID:1044
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5016 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:2
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1880
                                • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                  1⤵
                                    PID:532

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    168B

                                    MD5

                                    0dc15436a18077494989debd19d238e7

                                    SHA1

                                    9f6d76216a3b2a3b9dc5953c5525f2651673a77f

                                    SHA256

                                    24bbcc31222ad33cbc6cc10a4fbc480c6e433993a553b3bd82775cbd2aba78a8

                                    SHA512

                                    91788678b02318d3cac212f598e8ae16bb424ab3c2629e31a039c6cc7b31c5db35d9ef315406c1c99cc016e84d8d3d3a83003d14910a135ba2a340a9bcd016ca

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\39519881-658a-4eaa-b33b-00dec2cfbdc3.tmp

                                    Filesize

                                    524B

                                    MD5

                                    e27addbc579bdad46ab19dcbc5de761f

                                    SHA1

                                    517d043988265db3527f68385ec23fef1e8ca9d9

                                    SHA256

                                    83ac81ee6e21c822737d158f10fc4a49b38de82d777d5c62ae6fbad01f176406

                                    SHA512

                                    9b1a819054dfbb6b0fcb7ef12a638c8a2e3a2aef5027ccb2e5d586d7d65473b1f06622a591e9317f2077c9a13272de1f5d107d09deeb0fa2d2a82e429b4e4409

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    47052bed5a83ea0a481c6d933224a491

                                    SHA1

                                    250881df5fe3273420b57631a3d2073b5f4b3612

                                    SHA256

                                    91e8c7d6075fe7535889a2217cd7412def8c2511c3aa50378c797b9664cee8b1

                                    SHA512

                                    33c88e9757b2128b42a6da906bf7d1737eb3c878d130b7cbb9374162dbeb151e783f3c37fbf26960b0604a62cf4c3bb843a80e751ca5d0b074ba00b12207d783

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    2KB

                                    MD5

                                    710d84fe7a77edcf2646dcaeb5253332

                                    SHA1

                                    1786a67f976bef14da87acc0c1f8c143729467df

                                    SHA256

                                    0da0604e3c8f1f85109131e084841b67e9325d8a59fa315139a293765c28724c

                                    SHA512

                                    f144907d697f65941aa6cbfd4bd89087e65916ba10bc66a71c8808cbf3489c2c4468c1ef32552b421f23470a28d61db24b2fe7f29b930be843490cc9ff7ce26a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    356B

                                    MD5

                                    62a450c2c50087743644670caa9ebf50

                                    SHA1

                                    4d613707d219ba6dbdf031c9d022b0bceba41596

                                    SHA256

                                    b6628a05d4745abd78be5f92613d4d0d4e87ce55af87e6dbab7f00b329a958fb

                                    SHA512

                                    50290dcf6f4e99af2f2de690018059d6fcc1bbc2f4a28204b4d7a3e2e913e7779f016ded147ac590e885a33dc8312dded69f832e9186630d28478db06b975fa8

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    34f30e0f4c175da58be3e16df7968c3a

                                    SHA1

                                    64f43956448b9348da626f5232e2bfa26a55cfa7

                                    SHA256

                                    fba3329c0a46d32eef887a3c9155fe4c1adb0d204dd0fdbc01d2677a203bfe96

                                    SHA512

                                    7840662ccd3f89969a2b57a85800f54cdfbe45f52096131fd9f35afbc386cdbfb8387efab3ae526197fee2a67fbb6a02e7d6f6cbcdebf1bf5decdc783c49c190

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                    Filesize

                                    16KB

                                    MD5

                                    893de7d9566a2233210a4cf9c1c6bcbb

                                    SHA1

                                    bc2bd877be367384bd93f2271d20cd992d5fc0d8

                                    SHA256

                                    ee8b9b76c01c7b88a8d1b5a632c7ece3061cc5de8c9feb6c5cb95b660a53ea7b

                                    SHA512

                                    afc916e47d850eca056c84d7a6c65baa68a67e06aa0411938991f38bcdacedd9defd2722a4adadf7541b8e7dbbbae8ecbd402dd4ed858d1b28171a14d9cb6175

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    272KB

                                    MD5

                                    3adf4d3d95fc7aa1bcec1affbfec8e38

                                    SHA1

                                    3cd512fdcb9fc551d101b3f7d29a20abc717f76a

                                    SHA256

                                    cb43d2c41a4428f2ebf7d8939530b37234cd8240b53e95309db6f027f200ca08

                                    SHA512

                                    0e6ffc0bf5863407bfdd11371cd681b78d6294b690224598e5eb23027896275411cbcf898851803924ac4c34e11ab2d1db30ffebfe30e3af56080a6585ec5af5