Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
37s -
max time network
8s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/07/2024, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
Play__Now___Aud.html
Resource
win11-20240709-en
General
-
Target
Play__Now___Aud.html
-
Size
9KB
-
MD5
b9913c6c13c795d969bfa437c144d118
-
SHA1
d13b5c202233f332d4290bdd42d5799047ea36a7
-
SHA256
41676a1a410235d9649e83b060e0e1249002431c59dc47df595e4285bfad5bef
-
SHA512
38cb8370a794102af1fc3c64a30482d2654f36cce6a5b82cbbd477108af39fbd19b5997e64e177210bacf461dbfdd51997af3fd42e22ef726003d64f0a749dd1
-
SSDEEP
192:B1CM1lCSeNfN1rzFNGDM2YZ3eH8DhWeZZZZZHfIhWeYZZZZZZZ4ZQQg:zCMReNf3rzFNGGeHHeZZZZZ/reYZZZZV
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133661288012273224" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 768 4968 chrome.exe 78 PID 4968 wrote to memory of 768 4968 chrome.exe 78 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 2348 4968 chrome.exe 79 PID 4968 wrote to memory of 3936 4968 chrome.exe 80 PID 4968 wrote to memory of 3936 4968 chrome.exe 80 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81 PID 4968 wrote to memory of 2340 4968 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Play__Now___Aud.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf8e6cc40,0x7ffaf8e6cc4c,0x7ffaf8e6cc582⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,7145255873472037813,8913405671119592245,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1812 /prefetch:22⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,7145255873472037813,8913405671119592245,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,7145255873472037813,8913405671119592245,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2356 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,7145255873472037813,8913405671119592245,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3088,i,7145255873472037813,8913405671119592245,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4484,i,7145255873472037813,8913405671119592245,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4544 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD51bd81a4170d791df1f8f7c00cc77b5dd
SHA13a66330694f4170b87d25b645d69b0e80b9e2241
SHA2564c2f926659162fc94cb1776edaa159b2ce92ff3dffbf3098b66947c6dcb262ac
SHA512347f568838898494dcc78ea7de930d86bb6055fd284a741fe5c2ad45b84a7493bd4bb59b2b51fde23a953fc9d4cacaa26ae390e3a137aa9aabb1ca66d8c20824
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD57dd898e568a8bfbdba191f1a0c42688b
SHA1b72d854af8c9602b5b36b947017311d9ef58d6b6
SHA2560b9c53129a9ee01956c9f9515c9ed263bbeacd82a2ce6a42a813bcd6ef5c06b7
SHA512d56b49c6eeae2a44516316a80fb1eadeb6ae85186a7a678f34ba15173710ccfff306e6a98b21a317424045abaac101923484dd6a7a1495386fc280697b4dacb3
-
Filesize
9KB
MD5f622b4dbf32a45598c6251ec4ab513d2
SHA16fd49294454e0b4e977e926b8a5b54ba2b336c3b
SHA256c40eea980606b9342f294a4f2d9babb692f501b18c15c346d2cef6f8ab8d0324
SHA512c923570f32c27736de3fa4958b546569a31a51238ab19d273abb80b31f5033afd68276a2cf40c209178cb11fd04789f056b9f9c053a3145f4c7a32b231c607ae
-
Filesize
92KB
MD5fade489f71b35ef9dc6b3696b4cc9f61
SHA165ecc36d8290236eaf95c68b14385458ff8c8308
SHA256c31fbb90c59321bdff452d179ae0387840f7e237dac71a2ff0e82507d217f64f
SHA512f4b5e869af63b98b88e1c9c5d8a99bfafb8dc441e233874f25701d9f5ee8c944e955ca0381670e1464bb9be8589c7478359c1e90de631c38721ea09327068a4b