Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    300s
  • max time network
    311s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    05/07/2024, 14:11

General

  • Target

    ch/CheatEngine.chm

  • Size

    299KB

  • MD5

    bb80fec3b6e843b61859914480706cd9

  • SHA1

    0ced874bee5bda6059b5195911aa117693d9d2de

  • SHA256

    2d52f9d59211f8906ace16525721b1400343bdf720f062cf111d84089f129009

  • SHA512

    78d8a024dabd111b59beea4dc21150c7fbb3a6924201d2f3ff9e720e4bbc967bbff285ba2064bc35c260ffde433c639fdc0252c47ae29b43398117eda21cf648

  • SSDEEP

    6144:/UuFqUYSsTDiKebI7F03RPf2rB84daXcXrcURJo8tGgqQdB5+cbsQe/zQXE9LA2:tFhYSsnl0I7FG8S4daC/RGg1bnerQILf

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\hh.exe
    "C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\ch\CheatEngine.chm
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1080
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2528
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa0e4aab58,0x7ffa0e4aab68,0x7ffa0e4aab78
        2⤵
          PID:624
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:2
          2⤵
            PID:1012
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:8
            2⤵
              PID:3060
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2264 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:8
              2⤵
                PID:3988
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:1
                2⤵
                  PID:4580
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:1
                  2⤵
                    PID:4108
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3676 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:1
                    2⤵
                      PID:3052
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:8
                      2⤵
                        PID:4824
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4720 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:8
                        2⤵
                          PID:1004
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:8
                          2⤵
                            PID:3836
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level
                            2⤵
                              PID:4992
                              • C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe
                                "C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff7463aae48,0x7ff7463aae58,0x7ff7463aae68
                                3⤵
                                  PID:4640
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4880 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:1
                                2⤵
                                  PID:64
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3540 --field-trial-handle=1372,i,9144042348828000769,5992910005593516475,131072 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:464
                              • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                1⤵
                                  PID:2392

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                  Filesize

                                  211KB

                                  MD5

                                  151fb811968eaf8efb840908b89dc9d4

                                  SHA1

                                  7ec811009fd9b0e6d92d12d78b002275f2f1bee1

                                  SHA256

                                  043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed

                                  SHA512

                                  83aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  168B

                                  MD5

                                  e1d0d2e4a8b09226ff02e3e2da4bf5e6

                                  SHA1

                                  6384fd50ba4caf96d8cab42e555c79636749bdca

                                  SHA256

                                  3897ec59721f7b2a1566747243d474e0a93aa761a0564cc348825538c2f454db

                                  SHA512

                                  cd7548e31802de5c04f4a168e74a3c3b8a753df2bb9cbc4dab18cf84ec89133add006e6e33b0540163b6a8f813f17e332692b63838833c33133650379815f324

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  889ae08976f15e4d7d65d303796c6235

                                  SHA1

                                  38bf00a9594b69da4643ca59ffb9b0bc78dbfaa6

                                  SHA256

                                  6a61729545928a221f13a6aaa90ed4202294244bf641764d0135d3074dd3dc64

                                  SHA512

                                  ea30ed156741282822abbb3dc0b650531f6548fd630f714fe3be206203161e25606a21346761d8a8d540d7e58fa2a464b49ef3c808d49d255f8d883992536120

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  61a78237cfb319dc567beb927e2d8951

                                  SHA1

                                  8be58914ed3b41e4108353b3f5fd4122f2a0d9f7

                                  SHA256

                                  a795f82d7451c93e45396da000f85f0cae45a6bb64fd3045fa96110136232fd6

                                  SHA512

                                  dff82b39dc839b51b825f467479087f169c8fcbef40ebcfd1bebfb0e058a0422b1a99a0a833f07cdc69608654047a2da3ff334fe329f5ddae70e503412b5c16a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  354B

                                  MD5

                                  178543d2e15946f40a9b23ec90b8c49e

                                  SHA1

                                  17356caf87a8095c99ea679ab34c380a3b386c3b

                                  SHA256

                                  9c4b563abbf1c50658099659bbdf71c3563ba97b10d21b5a11e360dc7ce00ef3

                                  SHA512

                                  5b1388a1d2f8ebaa230e07c5e97bf5b5d61cd034cffe5ec09bab21c1adeb6111703ab20988c4c056be38a085d73c497e4d8633d1900d61a2d73811d70e8a94af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  aab0867220a934a560e04443ed0ac931

                                  SHA1

                                  b8b8f292b68282e53ca306577e8730312fa263eb

                                  SHA256

                                  4ea41870c07aa99bdf35dfa5d79d31f7be78de530483ecd016f6e1e1bc7920ca

                                  SHA512

                                  dba6b7c8e842600adb659915be399f557262da76160bd01b3f44bca6048e787bad920a70788cc133770109808a7b5ed249583755c0a6aeeb090f5c5a6da5a7de

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                  Filesize

                                  16KB

                                  MD5

                                  1e96e1023b593b6d9f26ee08a9689b15

                                  SHA1

                                  360c5dd37a29f5b6ea3151177132e4f49cf0f837

                                  SHA256

                                  7751e09f974ea3620c1709f383a99dbdb3d01acf6d1e5e0dc178f29783865f0c

                                  SHA512

                                  30a4aba27aad47869af4a61b82b07e2e4574134f406387bf06ae7eeba25a1e571f4b9aec6a2ee78c30fe382e79244a99cd0bf3e1048ec26c6fdfcc632ba67ebb

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b259e470-59d8-4c07-a289-4b4fabf963f3.tmp

                                  Filesize

                                  6KB

                                  MD5

                                  665355ce127bdcd5adf8e20454ff739b

                                  SHA1

                                  b244576dc87db0fb06e2bc2c0a53ad6fd36c2ad6

                                  SHA256

                                  49135ee2b2f011a770b0cfa30f564353998d4dfe95f32a520232ee582c3dacfb

                                  SHA512

                                  6cc01e57711451d76a5ced7319724afb3a34abf244b41506867b611d15bd98c98d4bf69fc6b8b8261938f8481524f186aacc7f8f75c7e9396a02b14018fb4176

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  285KB

                                  MD5

                                  0cabf5718a3762477185b09a89bb1b0f

                                  SHA1

                                  c02565cfef1b974ef66dc0da4755f421e621e3ee

                                  SHA256

                                  6536570e75d424ab171d5dbd7b144a637b6c4bc2560096a8f6882c0f96a568b9

                                  SHA512

                                  de9f7d0f5b22b9d5a419ee462e5defe1a730227eb81c238a336300f7cf81c669d2fdf9c3fba3fc60d4189cc65517a9e968c3154535c950617efe83401ef8b33d