Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
31s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/07/2024, 14:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://iqcompliances.acemlna.com/lt.php?x=3DZy~GDGKXKd6pF~yd69UBFz2H_Si_T1kMU4XXc7U3jM5838zEy.0eFv2n7ziNfzkfYxXHMWJXSZ6m
Resource
win11-20240709-en
General
-
Target
https://iqcompliances.acemlna.com/lt.php?x=3DZy~GDGKXKd6pF~yd69UBFz2H_Si_T1kMU4XXc7U3jM5838zEy.0eFv2n7ziNfzkfYxXHMWJXSZ6m
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133652686777045425" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: 33 2008 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2008 AUDIODG.EXE Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1520 1392 chrome.exe 82 PID 1392 wrote to memory of 1520 1392 chrome.exe 82 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 104 1392 chrome.exe 83 PID 1392 wrote to memory of 4340 1392 chrome.exe 84 PID 1392 wrote to memory of 4340 1392 chrome.exe 84 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85 PID 1392 wrote to memory of 2924 1392 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://iqcompliances.acemlna.com/lt.php?x=3DZy~GDGKXKd6pF~yd69UBFz2H_Si_T1kMU4XXc7U3jM5838zEy.0eFv2n7ziNfzkfYxXHMWJXSZ6m1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7687cc40,0x7ffc7687cc4c,0x7ffc7687cc582⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,17503956343081736474,2802367264922972234,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,17503956343081736474,2802367264922972234,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2032 /prefetch:32⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,17503956343081736474,2802367264922972234,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1636 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,17503956343081736474,2802367264922972234,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,17503956343081736474,2802367264922972234,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4312,i,17503956343081736474,2802367264922972234,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4320 /prefetch:12⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4480,i,17503956343081736474,2802367264922972234,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4728 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4732,i,17503956343081736474,2802367264922972234,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4504 /prefetch:82⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3736
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004E41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD57777d4ab6ae8bf5e3b01605e45afba4e
SHA1a9c020d9a2c518b029c0048860d2f150bc069c8e
SHA256c21790b2b327b5085f4c73adebfd759092e6d1ece3f741fb1e3091010a211013
SHA51270f648fc5bc4847b8ad712dc234986e0c1114fc5c23030e351a026b0487a3eecc4806fcac95cc257ec6e3a1d2c54ae1e2a8f3df69c03c0be430a532c2479a953
-
Filesize
62KB
MD5af3ca6e68427b320f546af1a3999718a
SHA1bf02a47f91e973d911abd47f830248618875af80
SHA256f5b34df125bf05b9dec42f4ffc66012eb46c47c32ba748e61fcb2280115089bc
SHA512fdcd66296fe3c4a4d39a26a7079b49209ec8809188f1d1d665efb63007b36517b1b112d3c02b82f9b5af5bb1ecc17a7a3a37b2b4bc58944dbabd275fa3e2651e
-
Filesize
71KB
MD53c562eef90015efaa52ce307daaf8985
SHA153f7b71b0f4687bf75eedc894796ea7565f254b3
SHA2562caabc121320a88a0a7c0b90a21956ef74c456d841e02fb3a2d5bfae53c234f9
SHA512a9314021fb559c34e17529426180c39ef2bf3d5c5c3a6b42f75c71eb6c8fc98013197f764e3a1a7e20569505ee55502cafbd2677e51b2f2eb022a19dfc11e4c4
-
Filesize
31KB
MD5a8ca491377c975b5759b6560e3e77610
SHA101113c62963a36aeb721412b8cb2bd9e95d7e676
SHA256af372c80315337f1044a0a6d093ef0f811dfa2a0a21037621f0fbf509ba4f033
SHA512e3f711361168840a689ee2327147ff4007d8c8ab740b14dd7448f7796146042e4c21cdc77643cd651720c9076c2f05c0de932179e3c8405595662025f53369d4
-
Filesize
29KB
MD53444dab155ca21dc7075c459ed178d3a
SHA1a28d6f68855f16e0d65ff687fc29ad8055482dd2
SHA256d3e168bbadf091355248ea80adb067fa9d7022ab0f79c6dbcab879513a082171
SHA512332c212d52dcc082b5b80513a109009891707d7d149ccba2bae2e6efe3e8c0361fd172f55d5356efdbf234d46a77cb9ece22f1a53d82387455685d387f146836
-
Filesize
40KB
MD5fdd0a7a58b37d9f155cc7fa6b00200e0
SHA11b3253a11da97aea90eed315a7169d23e8b373d8
SHA256e8823739e5e8b0492c9e444cbe0ed35489984efca1143a9f9ab23552a2dd45ca
SHA5128cc794b459865fcb651743499580bce8a546402f340f42f52b651df100e5519e66035378fb534c03fa314165627dbb1a43a8b92132e33282b2c570c4b66bbf38
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5b775484810908ba27d03d8aa748fc217
SHA19cc2f6f856067a3b62b3b91a84a2c9c93b1e744a
SHA25688e2efe5f1f0b145ca97e3607a067e7ae5ba7b64aac856570ee68214fad332d1
SHA512498c1f22d2b67cfa3e11123bd4377b4c3ee2804108acf77a1ae07d6d4700f1984dffea47bc8e140897837d7c58373a1ba0bdbce595e4202d538be938fa7abc91
-
Filesize
8KB
MD59e15abae50325a31c058372356b46c12
SHA19385b4d58e334dcd33c5752ea54bf1ce6369cb98
SHA256e98339ab7883738d2cf7dfb530cf31e7873c7a6be9f6c4197967381b33dd3be0
SHA512fbae4cf688e5c29bdce606a015d98d4824fa88d39aff165f6d639ff78537b73f496cf1b84caa52950ac10d67e4be270eb7248906df12e5035fc12b6cae4646e9
-
Filesize
8KB
MD5e0f98cd1dbf550df9b9bad04af999f29
SHA1541817e5b41d4bc567df01349ccdc23638e232df
SHA25680720ce84e9cc9ac96957f3d9970d071299a7c2f6acbdc5becf40597f7f52d69
SHA512224be81f296710e876d479ea8fd015e53bc0a95f9412138471b6dedc4154bb0fd44a55b39486f85fd39b815df3bb15b69a7c790873cb345c4e07bb7483fcc81c
-
Filesize
92KB
MD5c3e7c30656095defea99f0f09e6fb0dc
SHA1f63c5c351a63581d1d3bd03e1fad63d5dcc3b06f
SHA25631803b78acc6739193cbcaaefc810b7517ab076fedeefc1c27f7d69f7ed55b47
SHA512f7593b75d2bd54177767db413c3e00b572979defe7d77378a97ca9456e31185bca1cfafcec04fd2b72e4fe4959fea04dea60c8425842b07f67e289ef66271212