Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
Install.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Install.zip
Resource
win10v2004-20240508-en
General
-
Target
Install.zip
-
Size
36B
-
MD5
a1ca4bebcd03fafbe2b06a46a694e29a
-
SHA1
ffc88125007c23ff6711147a12f9bba9c3d197ed
-
SHA256
c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65
-
SHA512
6fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643228974090119" chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2096 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2096 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3624 2024 chrome.exe 90 PID 2024 wrote to memory of 3624 2024 chrome.exe 90 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 3644 2024 chrome.exe 91 PID 2024 wrote to memory of 5048 2024 chrome.exe 92 PID 2024 wrote to memory of 5048 2024 chrome.exe 92 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93 PID 2024 wrote to memory of 4304 2024 chrome.exe 93
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Install.zip1⤵PID:2796
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa4c6eab58,0x7ffa4c6eab68,0x7ffa4c6eab782⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1844,i,18350441951772191041,7493617311622722021,131072 /prefetch:22⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1844,i,18350441951772191041,7493617311622722021,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2276 --field-trial-handle=1844,i,18350441951772191041,7493617311622722021,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1844,i,18350441951772191041,7493617311622722021,131072 /prefetch:12⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1844,i,18350441951772191041,7493617311622722021,131072 /prefetch:12⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3888 --field-trial-handle=1844,i,18350441951772191041,7493617311622722021,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1844,i,18350441951772191041,7493617311622722021,131072 /prefetch:82⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1844,i,18350441951772191041,7493617311622722021,131072 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4904 --field-trial-handle=1844,i,18350441951772191041,7493617311622722021,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3416
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ResizePush.wmv"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810B
MD5cf3c2c2d357600015b540d6a7b4ff9fa
SHA10763e32169241bd9c5ace47b2cc51134b8c98a8a
SHA2562838b0258e7e1e7c9f86681c7ebeb4672a4573ceec23dd0ec1996c2462afff91
SHA5123d6a8403157dfa80cf3cd89249aa25a0cd9e87eec545d727554504f7168d2e033b427e7009845f7105fa18c1338ab9cbd7b7c2abcc98e3807a1ae63217daea1f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5413771c8b655018bb59ba027d960049e
SHA126249262395e743d0d18ad04084adcb543b5094c
SHA2567c94b73c01cbd80b5407fde55fd4a3718b1c6f803a09c0a0cf64bfe046e4ca2d
SHA5122a7807f212f8e239661445887884b634ea04348b6aa061a7bf3803fdae9f86a94506b5347b5d9be17109ba01668b00f7f9f383abcd3359f76dcb20875a0d2aea
-
Filesize
257KB
MD54789ee6494e0b2482d89c88a63a0417d
SHA1b2617f232b6161ca39793686914236c024ee2e5a
SHA2568928848cc96ca69615fc2280e36abdff1ff3ccf314033a8d6a36ef3bace999f3
SHA5123f3d786e62b5b35d27c735f35812e0cad045140274b8e48836623f087b6e083f0381cb1e6f49f3ef7207f80575ea914dd7c8e30f30238592119e6132222f2586
-
Filesize
257KB
MD543c58ba3320e93aff0f3c2ef1c3e9ba6
SHA1d0fe4ea4b579a0b37ec2e251d1f2ee7daecf0405
SHA256b44dd8e895956f74c63c22c2296f81b519ea2febfee3c78904b1ccd3f34210af
SHA51223c9e5e24ee6f7fa8aad5383c6c09895f3441728954b7636039206b7b99dc6c358e0a25b24324a1fea72f761301dde270c57d1d75a772677045d0e9bec603cba
-
Filesize
257KB
MD5493421036b66b289317337bfef78b542
SHA112de9c103edd2a2acd3c82a4952c50c301023681
SHA256c888230e330231480e975e38a96321a1e0942e93e855dbd8a5a9461fbffd5047
SHA512e6980968c5fcc8afb975b5db5d026d3f8ad84ed1c7acc07b17bf3353c91e64baf4da6bfa11f5182bb19573ccf73741e9101e1df7bcb0fd76cf93bf1741654643
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58