Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
250s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 11:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ww25.off-white.com
Resource
win7-20240708-en
General
-
Target
http://ww25.off-white.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2168 2412 chrome.exe 31 PID 2412 wrote to memory of 2168 2412 chrome.exe 31 PID 2412 wrote to memory of 2168 2412 chrome.exe 31 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2884 2412 chrome.exe 33 PID 2412 wrote to memory of 2204 2412 chrome.exe 34 PID 2412 wrote to memory of 2204 2412 chrome.exe 34 PID 2412 wrote to memory of 2204 2412 chrome.exe 34 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35 PID 2412 wrote to memory of 1928 2412 chrome.exe 35
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ww25.off-white.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6b69758,0x7fef6b69768,0x7fef6b697782⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1628,i,13863651750025286625,17149122935648434034,131072 /prefetch:22⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1388 --field-trial-handle=1628,i,13863651750025286625,17149122935648434034,131072 /prefetch:82⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1480 --field-trial-handle=1628,i,13863651750025286625,17149122935648434034,131072 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1628,i,13863651750025286625,17149122935648434034,131072 /prefetch:12⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1628,i,13863651750025286625,17149122935648434034,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1956 --field-trial-handle=1628,i,13863651750025286625,17149122935648434034,131072 /prefetch:22⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3308 --field-trial-handle=1628,i,13863651750025286625,17149122935648434034,131072 /prefetch:12⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2672 --field-trial-handle=1628,i,13863651750025286625,17149122935648434034,131072 /prefetch:12⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3632 --field-trial-handle=1628,i,13863651750025286625,17149122935648434034,131072 /prefetch:82⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5d65a9cff35f912550fe86c20f77e2641
SHA1f52d8ae19757c40fa44fd076dcef22553a56af99
SHA2569a8d63fd7dadca58a02ef77d6cc878eda698049bb3d52ee7d056cbeb72b7e33c
SHA512c5e8caa817ee90fcdf4f3ea8072a9ef24669a9bd32d068d23299d5aac4087643386b56b8fe9f30b6eab42e1c7149fc4e32f04b3d91bd0857f96e1c9562364c29
-
Filesize
4KB
MD5ab5926445e3488e93381b0232394ad92
SHA14dc24861f5ff61ca917370ef5c463f963ad0dcd7
SHA2567304371711a9aeb6dcdef811a017d4013538cc4cc085aba7a2822c255657a340
SHA5126e5818dad1cde6952ed504d1f68b696ae3a3b85a414571899b9cede3eead86271a05a5ecaba6186033b8452c0d8e184972fcf4509e1016f71e9596ff738ca8bd
-
Filesize
4KB
MD5ad78953dc9cef66c7d0de4c12500b35f
SHA14a3dc7553a081ba455135d95b9d5b1acebf3c9d1
SHA256dde83d6a88b56212f8cf383f98ee504075322cbacb0c42b143e0d8ec5e555e68
SHA51284f1fd7b6311f7c6d39b4b4048a4d03b67e6c34e9832b1d80aae29d0361767b5a9d123cf1732e69d5553e83387e1a5b46faf765af65b99af647d4d991abe5e5f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2