Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
521s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
07/08/2024, 19:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1270531201375014952/1270658809655853077/SG9uZXlwb3Q.exe?ex=66b480bb&is=66b32f3b&hm=179e2cdab542d4bd8031c1c620dde0a1a2500cef326190bc13e4afa07eaa038d&
Resource
win10-20240404-en
General
-
Target
https://cdn.discordapp.com/attachments/1270531201375014952/1270658809655853077/SG9uZXlwb3Q.exe?ex=66b480bb&is=66b32f3b&hm=179e2cdab542d4bd8031c1c620dde0a1a2500cef326190bc13e4afa07eaa038d&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133675345921205484" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2772 wrote to memory of 4168 2772 chrome.exe 74 PID 2772 wrote to memory of 4168 2772 chrome.exe 74 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 1844 2772 chrome.exe 76 PID 2772 wrote to memory of 5008 2772 chrome.exe 77 PID 2772 wrote to memory of 5008 2772 chrome.exe 77 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78 PID 2772 wrote to memory of 4556 2772 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1270531201375014952/1270658809655853077/SG9uZXlwb3Q.exe?ex=66b480bb&is=66b32f3b&hm=179e2cdab542d4bd8031c1c620dde0a1a2500cef326190bc13e4afa07eaa038d&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb75dc9758,0x7ffb75dc9768,0x7ffb75dc97782⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1776,i,4463959918414192874,9976592369833315909,131072 /prefetch:22⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1840 --field-trial-handle=1776,i,4463959918414192874,9976592369833315909,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1776,i,4463959918414192874,9976592369833315909,131072 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2836 --field-trial-handle=1776,i,4463959918414192874,9976592369833315909,131072 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2856 --field-trial-handle=1776,i,4463959918414192874,9976592369833315909,131072 /prefetch:12⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1776,i,4463959918414192874,9976592369833315909,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5308 --field-trial-handle=1776,i,4463959918414192874,9976592369833315909,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5344 --field-trial-handle=1776,i,4463959918414192874,9976592369833315909,131072 /prefetch:82⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 --field-trial-handle=1776,i,4463959918414192874,9976592369833315909,131072 /prefetch:82⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 --field-trial-handle=1776,i,4463959918414192874,9976592369833315909,131072 /prefetch:22⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\22ca71f5-19c8-4c2e-834a-df7a5b5e19ff.tmp
Filesize678B
MD59dbffef8ec065e1299033ba5b9081fe1
SHA170d3eb3406dec847653c8f95af33a7d09348c5a2
SHA2560ebcbcb9f66f91cc3d3df273b37ccf8aef553293ef12859018b4878a988ed71e
SHA512bf1332df3f50590fd6c7f3da055373f168abc351b77c021813c32ae389fee50b7ca68010616c19c6a38b00c62efcd85436ebd4bd3c775bd01d0d4a98c6ed5ba1
-
Filesize
5KB
MD53d2d0f48451ecb5e9d9824061305ed60
SHA17598cff56d72d0d4bf12780478f58aaaf294353c
SHA256693996dc00106942a04bb3aca611f3a8125d9c920ee7a77a13488f248f6454b5
SHA512881b5b21279083a0733683b344978fee52d5f8f3243cbe4a11ed90e56d9623868bfee660be4763880047987456e258a77168830e9939a105735e06eb7ad778f7
-
Filesize
5KB
MD59875b6daa0954a8877b961a2081ea0f8
SHA1fbad428365c20b871272d40cf27dcb6fe7d5ceb7
SHA2560de6434aacb4d431b371ba27113a17553d4b46789591b049c0a2f71db01e1b2b
SHA512869feb16011e3e2d4c9c59e0c27e1bb470556d86a108107ee3910c52359b6ba5ed0641be40d731966b07d046691efe2e5d70f57a46dd633a3fe47ee3eec0845c
-
Filesize
5KB
MD518927a80656a53e961c69c59522efc1a
SHA16b0e453a9c053171eb084fb95d71d28fc63e0937
SHA256236f0226d4d6a603106a43ced0e277fa377a91ba4ce0e6e150db02895f13cb11
SHA512a04843f01bf05dd18f1e30348460bf296b243ba49308a6911fc713243673223c0f0bf5a71d3b0392bc73127906f75457453e2f71ca296e9af4c58222c34cfc64
-
Filesize
136KB
MD5a4574a945cd9ac749089c2c9f230334f
SHA1bc1598ae6caac93a4fde223d6b330351639d491f
SHA256d287dac6e58805e411ca07cc43c4b888b66eb6c8d6abe9365e8bdf763cbcd0ea
SHA51218f291cbf1ec550b0d4c980044703cbeadf8a6055109b52aeb1c2c8456c474445c1b14480222afdf504c09ef623e4b792447a17927defb5b68bf1f1453990982
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1.9MB
MD5840a437a3f0fd4ffc7e640fd50112fb3
SHA1b8df93d4ad036fdd203d55c56c2224ca4a53c187
SHA2560e3ddc4add4de93951bc64ac614f5e616d46a9d23d9d9aa56aa27b0e31c073b6
SHA51201d5c6a41c4f1c7880e6552afa865dc60fe8873b579f2e84146fe22dbeb1d2ab6550d02cb014c5a8b45f22f3370a4d76f4bf60aee16866f642c6cdcba965fd72