Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 12:00

General

  • Target

    https://chip-cluster.de/api/downloader/?lastchanged=20210507T0920000000&pid=chipderedesign&cid=54481504&euid=530a9bdf40951f784f13343a&browser=chrome&ref=&tid=39002&tpathid=9223_9232_38915_39002&os=windows&tname=Portable+Tools&ico=&proto=https://&fallbackUrl=68747470733a2f2f7777772e636869702e64652f646f776e6c6f6164732f63315f646f776e6c6f6164735f6175737761686c5f34373233373837362e68746d6c3f743d3137323235373936363626763d3336303026733d3965343530623332356537353563326432616463316135643065333531333264&h2o=true&source=BLUB2&v=oct2015

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chip-cluster.de/api/downloader/?lastchanged=20210507T0920000000&pid=chipderedesign&cid=54481504&euid=530a9bdf40951f784f13343a&browser=chrome&ref=&tid=39002&tpathid=9223_9232_38915_39002&os=windows&tname=Portable+Tools&ico=&proto=https://&fallbackUrl=68747470733a2f2f7777772e636869702e64652f646f776e6c6f6164732f63315f646f776e6c6f6164735f6175737761686c5f34373233373837362e68746d6c3f743d3137323235373936363626763d3336303026733d3965343530623332356537353563326432616463316135643065333531333264&h2o=true&source=BLUB2&v=oct2015
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffe395cc40,0x7fffe395cc4c,0x7fffe395cc58
      2⤵
        PID:4608
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,10793294472177093033,1693645938200941019,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=1932 /prefetch:2
        2⤵
          PID:2944
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1868,i,10793294472177093033,1693645938200941019,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2432 /prefetch:3
          2⤵
            PID:2024
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2112,i,10793294472177093033,1693645938200941019,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2612 /prefetch:8
            2⤵
              PID:3204
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,10793294472177093033,1693645938200941019,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3152 /prefetch:1
              2⤵
                PID:4948
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,10793294472177093033,1693645938200941019,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3324 /prefetch:1
                2⤵
                  PID:4980
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4900,i,10793294472177093033,1693645938200941019,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4944 /prefetch:8
                  2⤵
                    PID:404
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4940,i,10793294472177093033,1693645938200941019,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5084 /prefetch:8
                    2⤵
                      PID:3012
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4936,i,10793294472177093033,1693645938200941019,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5268 /prefetch:8
                      2⤵
                        PID:220
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5192,i,10793294472177093033,1693645938200941019,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5068 /prefetch:8
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1636
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                      1⤵
                        PID:2788
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:4316

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          f5bd12b594cc59e452c9ac138c92c5ac

                          SHA1

                          f0347fafca079bc72723c659fad216bfb9180487

                          SHA256

                          d965507b254e3100199a71b2b22dd4d5105d8a53e6348bda1f06ab05f430a067

                          SHA512

                          7bc4cea25acbd5b15a9f726927c6540956cca286fd1bb4a457fd6a5853486b038c388ed09d821a7df803b687ef657c292305a49491565c30d905d52b71e0a69e

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          cfd4a9ca49dea76b88a1e6a68d42860d

                          SHA1

                          02ba54779f2747b5584579e89d487a8f0be246e7

                          SHA256

                          144aafc71efcb68a9aa65b486b14eb591c86cf3c40ea40acb2da45ab7d4f2d84

                          SHA512

                          47f1b44cc4b97d30cfba158be23504a502498a7a9e1e67770b15112b97df7d4df7e5dc808227ce7315f79d1949923db5cc3695754f67a7bda7cc5cc8fadb5f56

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          99852c0a913a29fca02fc49d99ba5d84

                          SHA1

                          5467323331e76ada1e6f55794fc3f3699719db4b

                          SHA256

                          453ee6b90ed18524b5cad16737ff92d2bba6cd6da48246e07dfe76b7bbd631b1

                          SHA512

                          592561a3fb7300d17617212926f44d66b0da279b30c250703c81901cb43e18173de7a44d37ec5f6dc7fe00cd7e8c72d750de59d6e0dd1425c52fe7ac25fac036

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          b992fb8b91bf62519b24ab64a0f54fa4

                          SHA1

                          34a813840e8ef98997249ba71d76182bb314137a

                          SHA256

                          225d2b7492dddb094b2dfbe7a51a07540c55d0e0159f9f14989f140cd1e36b96

                          SHA512

                          8d80552c7fa3936f522197f228237093dd6cbe5fb63aec0ad7d9427fe570fb60191db46986b06b1a0e5acbf3c06168c547b4b06f23f3055116bff1d4745d4aa6

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          42c9cc9c50cd64f28229056ae6543a48

                          SHA1

                          23d2b5223ef03877484df73dd6c6ca4e268ed6e2

                          SHA256

                          4b217a8f12f6015536dff079f064b3a9cb718645e9bbc3a434cb839c1638287a

                          SHA512

                          63079114d9e25d1f44ece0033e430248fcc197719afbe727afc2781ef4afbaf08c86caa7f577c5535448bf3ea6613324dfd92f579a56e56248c49e43efded2e9

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          01632dfa8db0deab61dcc6e8e7f5dd6d

                          SHA1

                          ada27a866ef8f126cafd7ecca68aa2ab2e23e2a9

                          SHA256

                          a73e81a78f6ba6f9c93d7b4549105c7905efce92678541a146be5996d22ccfdf

                          SHA512

                          9ad52458c07c6b64b92c37a2748cbc65789ceb7afa01a7fb53cb487a091cf885656349ea79215fda958a3465744f4cd36f612c1571531084df7cf8a497b59aab

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          21ddf2b660f0a5590ad6ef0e0f779b8a

                          SHA1

                          5e16731f7f63422157b16c6342d2e0526ab17eb2

                          SHA256

                          2a45d11d1d4138504c1f36500b5956a625d4be5e045187c776abf262d7b804da

                          SHA512

                          31232415cf24457ecc326d45a3e5d5019c529209617a7785e224d059db54118dc03f96a1777b5494675c1d1da7782d7b65c78c7259e87e342c7bb1342473b352

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          100KB

                          MD5

                          4a746c32a92df05b752fc3bfb17f04ab

                          SHA1

                          eec09d256f7198694fdccfa1af5b216a608a4687

                          SHA256

                          029944341c04720e6618d810a8a7f21396c3646840b210fb1dac1ce98fecaa7c

                          SHA512

                          0df6ef9b95bfa2906f232d3ddd794373eb249aa6620c297b1edd676ca22f4fd0390a7bb218839716a8713dcc1637e055f081303e0ec1badcd54df073cc59532d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          100KB

                          MD5

                          b49d7ea68a82fd8ea9e0bf62bd6e2344

                          SHA1

                          57620d65f5db9527857f8c649456590f531da83a

                          SHA256

                          f41dfb4f5e3c822de39107dc19dc7ebaae25c7c04dcc6aa93f082340d46f4dc0

                          SHA512

                          f5bd0079bf5a68c189e440d53cf78b74ead988e56e9f4a9dc0932e2786905dfbf0353a0077eb533ae13586c32fb4f4e35c4d226a02149480e0282b1031da0b96