Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

23/07/2024, 14:14

240723-rkfy9axckb 3

23/07/2024, 14:14

240723-rj96psthmj 3

23/07/2024, 14:13

240723-rjnmpsxbph 4

Analysis

  • max time kernel
    25s
  • max time network
    27s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/07/2024, 14:13

General

  • Target

    A9BFFB1AFBC.exe

  • Size

    22.6MB

  • MD5

    991eb213e07b300da2e613540ab73b22

  • SHA1

    92e47343213beb45fd1e5c46ebb2e4e6112bba39

  • SHA256

    e8672bd4ed55ba72a3dbf8485cd62f250c62f9440ae2f3802cbb0c0bd713426b

  • SHA512

    9d1df2a9d2a32209363dcce21f5442ae373cf08aa3cbba3186182abc5ff2d1b9a6212b90d149c391d9df1f9fd098c483a7e99a3bf9177f0047e282235703c31f

  • SSDEEP

    393216:wjUhQ5zzPiYfcLYnzjbLYg/GXv2pXpH9P3il/gsHoEl8h/lt8/QH:JQpKYf+CLHGm9PggsHzylt8i

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\A9BFFB1AFBC.exe
    "C:\Users\Admin\AppData\Local\Temp\A9BFFB1AFBC.exe"
    1⤵
      PID:3908
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc48f8cc40,0x7ffc48f8cc4c,0x7ffc48f8cc58
        2⤵
          PID:872
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,17226682273188751813,5756179360811801171,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1824 /prefetch:2
          2⤵
            PID:3712
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,17226682273188751813,5756179360811801171,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2096 /prefetch:3
            2⤵
              PID:1696
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,17226682273188751813,5756179360811801171,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2368 /prefetch:8
              2⤵
                PID:3340
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,17226682273188751813,5756179360811801171,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3136 /prefetch:1
                2⤵
                  PID:2112
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,17226682273188751813,5756179360811801171,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3264 /prefetch:1
                  2⤵
                    PID:1700
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4516,i,17226682273188751813,5756179360811801171,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4492 /prefetch:1
                    2⤵
                      PID:1452
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                    1⤵
                      PID:4848

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                      Filesize

                      1KB

                      MD5

                      de56f1a5f16714fb6681363a6051d18a

                      SHA1

                      222ff0e3850b270e81b2310da8c0f57a12da900a

                      SHA256

                      c96cee6bfa6c1914a23ac57f11423257b98f98a3bd810f1565676d82e68ab212

                      SHA512

                      db8b82f356cbb74a0e7f1d201ab6995768c4819990cf2f86f9ace0a38f58c187fe71cf51e79aaca0b43dd5d4404952d539109200fd8045727c08cf039592bd52

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                      Filesize

                      2B

                      MD5

                      d751713988987e9331980363e24189ce

                      SHA1

                      97d170e1550eee4afc0af065b78cda302a97674c

                      SHA256

                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                      SHA512

                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                      Filesize

                      356B

                      MD5

                      d0bd34ee447fdb2e2444c60668427d5b

                      SHA1

                      164f441b6997525f5b63f1685b43e4081915bd82

                      SHA256

                      26b54c6d86dd9be4cdc9641269fef49b3d056a265c53ffc8e166b743fee989ef

                      SHA512

                      d3d19c78c4079fc304e312ff80ce5242ebf50f066687516a850388f3f177db170e686bfa16a7e99bbd4abd58df55c0d607c89d35a6cfe19ffb8d22503c0598d9

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                      Filesize

                      8KB

                      MD5

                      166ab9aad9eac8cb0d4ec3efcd76e0aa

                      SHA1

                      6ed686b3c792162c2392dfaf7646b3393788dd1c

                      SHA256

                      04bb3667c6d99f268df22a96125f78636835986d752a5e570571157e0f4a9238

                      SHA512

                      5b87bd8f26fb12424b3f8a533c186b8b67375bd59921cc40f6e694629cde18d77ea520e01c14c9e9f50897fa09d3f8023cce24c7332ee281cc646eac660f6d59

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                      Filesize

                      92KB

                      MD5

                      417d11876833d20d0d60a318c2f78948

                      SHA1

                      d419b8049bf4e55ce3f953b33836dd69cb880de6

                      SHA256

                      1960e8b90c2baa1f2d04349e91298bd1022d36e9f87939bf6049314bedefde4b

                      SHA512

                      b55fde6b8944193dabce8c6ef0748aed51ea82a7d47f891a374509334ed2012aec23523d1ae1dbf14858cb33daf095472416d90fc71c3a511906747473ad8af3

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                      Filesize

                      264KB

                      MD5

                      f50f89a0a91564d0b8a211f8921aa7de

                      SHA1

                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                      SHA256

                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                      SHA512

                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58