Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    78s
  • max time network
    80s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/07/2024, 01:43

General

  • Target

    https://mega.nz/file/IacBxCDL#W0n739LYFP59X-AJM7zG2AsXUuL3QXWzcmT3SOFAaUM

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/IacBxCDL#W0n739LYFP59X-AJM7zG2AsXUuL3QXWzcmT3SOFAaUM
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffff55f9758,0x7ffff55f9768,0x7ffff55f9778
      2⤵
        PID:5104
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:2
        2⤵
          PID:2920
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1820 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:8
          2⤵
            PID:3332
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:8
            2⤵
              PID:4476
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:1
              2⤵
                PID:3668
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:1
                2⤵
                  PID:4056
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:8
                  2⤵
                    PID:3308
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3780 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:8
                    2⤵
                      PID:2632
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4932 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:8
                      2⤵
                        PID:4172
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:8
                        2⤵
                          PID:2564
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3720 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:8
                          2⤵
                            PID:4728
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:8
                            2⤵
                              PID:5040
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1840,i,12717272436128804787,14340820721016074419,131072 /prefetch:8
                              2⤵
                                PID:3464
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:4020
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0x3c0
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:996
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:1908
                                • C:\Program Files\7-Zip\7zG.exe
                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap20491:122:7zEvent8021
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:3172
                                • C:\Program Files\7-Zip\7zG.exe
                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\file$_here\" -an -ai#7zMap8440:116:7zEvent5703
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:4932
                                • C:\Users\Admin\Downloads\file$_here\Set-up.exe
                                  "C:\Users\Admin\Downloads\file$_here\Set-up.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Checks processor information in registry
                                  PID:1404
                                • C:\Users\Admin\Downloads\file$_here\Set-up.exe
                                  "C:\Users\Admin\Downloads\file$_here\Set-up.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  PID:5052
                                • C:\Users\Admin\Downloads\file$_here\Set-up.exe
                                  "C:\Users\Admin\Downloads\file$_here\Set-up.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  PID:2756

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  72B

                                  MD5

                                  3850742c13bb6c820139631b7d65d9f5

                                  SHA1

                                  1b0aa9a52c268e590b075b363a688c897b52dc54

                                  SHA256

                                  43c9f4683448fb2dbeff2617198c3739ed669132ed938ff1fd76744c6fa7b844

                                  SHA512

                                  59a4c4a49ab9a72f638b4e0b2625f95acc1155358a437efba355555cfe00741857f66a0fa377a2d71522fca2216ebfe1f142a12f9157c6b76c142a63613668f4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\MANIFEST-000001

                                  Filesize

                                  41B

                                  MD5

                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                  SHA1

                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                  SHA256

                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                  SHA512

                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  962B

                                  MD5

                                  9b255947b7fe7de96d2fcc8bbf22874d

                                  SHA1

                                  e0d7f72362ea31eae4512c1926238fbdc1db63ee

                                  SHA256

                                  19c28a7f7230c9593a8a4e253a815a674a9798ba04d859d949aa01bdf4d33d02

                                  SHA512

                                  4088e21093c068245dea861ba06029c6cffc2ce1fda26fc5601b37c9dc40ed86f0982be35aa98815e2c7faef7db336c65aff414960cb57c2249769ed82e3582b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  536B

                                  MD5

                                  c4d493d90547d637c9484f929c91ffa4

                                  SHA1

                                  1e772a544c58e792bdc21c3e3e01dc8704b10c56

                                  SHA256

                                  cda95b68b4e759b90636d6b2849c04fb2e49ab630d1c8fb72cf1a6f18eedb3e9

                                  SHA512

                                  3aa12d8f761db938011daba5a10fb92d3ec85bbb1b493947d1ecf73fc64778fe93ee07c1f8adc990ccf96c141fc8fe3da5ab6466e60292a058a1b14bfbe21663

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  75027eaf590f2016e763d110ce5e9165

                                  SHA1

                                  c7d53bee0c9f6e4892c3b1ef0e106f6495e2eb39

                                  SHA256

                                  76eaa496f512c57f8ea93c28224e8321acd5d088a88cd5df9f5fa4ddc6dd1249

                                  SHA512

                                  8cfa533fca2455658312251ef446cd918751232aab343db4246b3ae0d77b8abb52d9ef57d36a6625e46de8ce908abb5435cf0c823abb38791e7e5ea1b5fb36c1

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  754e3bd10c27417b81d9a48030f71947

                                  SHA1

                                  73f372fc7b71ce08ec681c4627e117861b077514

                                  SHA256

                                  0e80e00fe705a406f432bdf7924b8f5fd151e6d711e2a7b9a0d39e317f3d0c49

                                  SHA512

                                  f900fe95a04eeb6bc04b9ed1fdc8de8d54cf26c79641ca5d4bed7785e125e5b4cbe8cdbb514308f26e07e2421ecc72ec0375c00e2dd09001ab8984118b3a8f2f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  46295cac801e5d4857d09837238a6394

                                  SHA1

                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                  SHA256

                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                  SHA512

                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                  Filesize

                                  72B

                                  MD5

                                  d8cbfef2a605c35640ccbb77797878db

                                  SHA1

                                  40d6c5174f5d698f307991642eb22d606bb2d9ff

                                  SHA256

                                  9f81cb650e78373c98e73eb7f8e6a55b1b4012f9ae7ce9b8bcc6d122468e96bd

                                  SHA512

                                  f15833ce6082a3d58759b189cc9ab70e2ca2cb17629cbd5ca06744b6d716d13d1d91c2d92c1c64b30891f3960372069a04853652f9398a13e76358ce7157a66c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c217.TMP

                                  Filesize

                                  48B

                                  MD5

                                  46c217ae9161797377d3d9e0b8e9857d

                                  SHA1

                                  874aff27a602e735d7e7fa0020f479cb1e9ce9f9

                                  SHA256

                                  8a7e355eff471678a8a0a07c6e4273b933ecbf9bac7de646d8096bfe59ce11b8

                                  SHA512

                                  1df42bce7b0ae53b5f132b7a8d57a4d39851b1f45fc93a164c7ba614277df6bf280c847173a69819cfb0ff8edb1fa982769e8a9d986779ff7f7b3ad2d7c1f11a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  212KB

                                  MD5

                                  e397ef6aea8cf0aee71613a5f459008d

                                  SHA1

                                  0cf19499aec55ef33a20f6bfc07d096c006b1e64

                                  SHA256

                                  b55f921237095938d140ddace47d0e191c49c77ca46d090cb1b90ce46d344ed5

                                  SHA512

                                  63e9b604af83c114b794d7bd233fdd8b817d03cdbf725bb02e9d61b935a48741e8400cfb6c1d493f1c30c282a22d192d075045abc1c5a14d30d116897027d280

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  138KB

                                  MD5

                                  a88c30cf146b2cef86632af09087bb9b

                                  SHA1

                                  08d599c2eae8371b10d05e043481314864673a2f

                                  SHA256

                                  603bee596966ebbb2248d890300be0708716af943e556c74598ce6f497c5eedc

                                  SHA512

                                  441c109b9f47a92ef01c9c1cdd870a7578257337dcb60ce6cb46784fc3efb0d1b18095cdc1cbfaa8d81a7d7db87a4cce32689233c9d0b0b08681b7a86f083027

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  137KB

                                  MD5

                                  502bf0352778e3e65f164247c28c7b34

                                  SHA1

                                  40ad7e306ee296591ee7808e3df83c2371f61c8e

                                  SHA256

                                  49822df22142f7cfb536d2f8745c8dafdefc7e40b3b237459e03b868e4753cdf

                                  SHA512

                                  f0555a5bbd5d7c5a4d1e00d04e221a88546df79785f2fd8605f62a141c49e77fa2e47220351ab871a10a83bccc00b0a14444fb050a7044be5467caf9eab697c6

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                  Filesize

                                  2B

                                  MD5

                                  99914b932bd37a50b983c5e7c90ae93b

                                  SHA1

                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                  SHA256

                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                  SHA512

                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                • C:\Users\Admin\Downloads\file$_here\Set-up.exe

                                  Filesize

                                  2.5MB

                                  MD5

                                  ed91671ec89396d0a2bcfc2a04d5c17f

                                  SHA1

                                  635bdd3439fb4b2afb4229a1a1bdcedf06232dd0

                                  SHA256

                                  55697be174d81b34a1f5d47dcfd086f80b3da8c771f6df33b7dd5ad568e15f06

                                  SHA512

                                  5311544713a5ea2536870f2c8d4987755a3e35c64468ac4620f3ca2db3691f2f8e08275fdbca2a43e98edd49ef221c8f0bad4b90451674ee09bc9f9cc7eeab99

                                • C:\Users\Admin\Downloads\file$_here\use_2024_tо_оpen.rar

                                  Filesize

                                  13.8MB

                                  MD5

                                  1501ca46f6b12c2e2e1b47475c2185da

                                  SHA1

                                  427ab48a4cebb952701e6d4ff88754ead4e35441

                                  SHA256

                                  7b834b5d253cc13014789640714d3684d3bf1580e38ffabe0d44e88048e989b3

                                  SHA512

                                  8c320254ba02eb266bd3ca7959d92a26478c3d51788758dd2290942feb9f630d10d718b94952265fa409406b732dd2388cd853db26b6db0566c25643d00bde96

                                • C:\Users\Admin\Downloads\standartfullvers_setUP_02168-3.zip

                                  Filesize

                                  13.8MB

                                  MD5

                                  63cf522e831965c21c82836f858bebf9

                                  SHA1

                                  8b504079f4f9db96bb145b0538f4406d17f4faf8

                                  SHA256

                                  a48db7081797fe9962732ca8d8ece50b7c75b756baf9808620f74abe70b4369e

                                  SHA512

                                  450a41d96f59a6fa48d4d94a27136917704654c01e7c6725262410c6d2127d224d1188e6dbaee62206ace078e947e96fbef47d3078c085c202454ebd1a2a5440

                                • memory/1404-573-0x0000000000400000-0x0000000000C32000-memory.dmp

                                  Filesize

                                  8.2MB

                                • memory/1404-578-0x0000000000400000-0x0000000000C32000-memory.dmp

                                  Filesize

                                  8.2MB

                                • memory/2756-577-0x0000000000400000-0x0000000000C32000-memory.dmp

                                  Filesize

                                  8.2MB

                                • memory/5052-575-0x0000000000400000-0x0000000000C32000-memory.dmp

                                  Filesize

                                  8.2MB