Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    20s
  • max time network
    18s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 13:19

General

  • Target

    http://c.vialoops.com/CL0/https://app.loops.so/unsubscribe/clz737voy01390ll7g0hqfc3w/551ca16f70f8d97182ab50d69e367400de0a6b26526c41d6c071ff1f5d4949d0/1/01000190fee76ed0-b4315390-e4e7-470a-918b-0b3d2d3a61a1-000000/gnrVAEUqkIvKuCcSrSXbz_X4BgPM3oQN6136aDJNc6U=363

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://c.vialoops.com/CL0/https://app.loops.so/unsubscribe/clz737voy01390ll7g0hqfc3w/551ca16f70f8d97182ab50d69e367400de0a6b26526c41d6c071ff1f5d4949d0/1/01000190fee76ed0-b4315390-e4e7-470a-918b-0b3d2d3a61a1-000000/gnrVAEUqkIvKuCcSrSXbz_X4BgPM3oQN6136aDJNc6U=363
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9fc97cc40,0x7ff9fc97cc4c,0x7ff9fc97cc58
      2⤵
        PID:2448
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,10312676242099176812,16971012546295130081,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=1920 /prefetch:2
        2⤵
          PID:3924
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1856,i,10312676242099176812,16971012546295130081,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2032 /prefetch:3
          2⤵
            PID:4396
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,10312676242099176812,16971012546295130081,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2428 /prefetch:8
            2⤵
              PID:4820
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3028,i,10312676242099176812,16971012546295130081,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3060 /prefetch:1
              2⤵
                PID:4196
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3040,i,10312676242099176812,16971012546295130081,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3256 /prefetch:1
                2⤵
                  PID:3568
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,10312676242099176812,16971012546295130081,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3764 /prefetch:1
                  2⤵
                    PID:4036
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4000,i,10312676242099176812,16971012546295130081,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4576 /prefetch:8
                    2⤵
                      PID:1764
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4764,i,10312676242099176812,16971012546295130081,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4772 /prefetch:8
                      2⤵
                        PID:940
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                      1⤵
                        PID:5036
                      • C:\Windows\system32\AUDIODG.EXE
                        C:\Windows\system32\AUDIODG.EXE 0x3c0 0x470
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4828
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:1092

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          858B

                          MD5

                          c1c0e15afc1732b60cfc167766848bea

                          SHA1

                          4e05f71691d722903eee168fd0f2fb72c7c67ce2

                          SHA256

                          55e588388a0cb459c6713a353792228cc2cb3edb8702ec32b97cc62bb99cc812

                          SHA512

                          2aa949fad3c4a3bb2b496a8ecf7321fb32f17088a6852e301947066a07ac545aefd0faf4a53806ada2bfcd0bdbccb638aeb8171044ae82531d477bc80f97b631

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          18eabf0a9aa46a9b25129abab486554b

                          SHA1

                          a943bfc1d746ab108997e4cbf9cdfec788701675

                          SHA256

                          16456b23b28046ae1740ba1eeeba40716281fc065713a94f9a1994ddd71834f1

                          SHA512

                          776c99872b57f5e9ab7a0c1c0a1c426cedd93259ef876a4d30bd26f36175c931e27f5bc019c10cb8ff16d2aff1b08ac596059617e6c20619465664e1749655b0

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          197KB

                          MD5

                          cd35b2f0e9b2a22719a9c35d734c5b86

                          SHA1

                          9ed6945948100f33aa65562e6f40414cde5c5baf

                          SHA256

                          4ef9e2415c7e5d7ac28af85a4f4004f27bc38c8d96723e0a43aa8fb4621c05d9

                          SHA512

                          80d97ce4cd16a3d658e69e73aa143e6fa650fd0cf165a8dc5c12a0a44828a978f450f5e361339c7e4db9ac7b007ec3fa18005da873bc85b3393864e5a1dd775d