Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
11s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/08/2024, 18:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://duo.app.goo.gl/ztukHcq
Resource
win11-20240802-en
General
-
Target
https://duo.app.goo.gl/ztukHcq
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680461662682505" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 872 chrome.exe 872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 872 wrote to memory of 3104 872 chrome.exe 81 PID 872 wrote to memory of 3104 872 chrome.exe 81 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 1724 872 chrome.exe 82 PID 872 wrote to memory of 4944 872 chrome.exe 83 PID 872 wrote to memory of 4944 872 chrome.exe 83 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84 PID 872 wrote to memory of 1728 872 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://duo.app.goo.gl/ztukHcq1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1581cc40,0x7fff1581cc4c,0x7fff1581cc582⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,4626917232395471474,5038863821255945297,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1932,i,4626917232395471474,5038863821255945297,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2040 /prefetch:32⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,4626917232395471474,5038863821255945297,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,4626917232395471474,5038863821255945297,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,4626917232395471474,5038863821255945297,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4304,i,4626917232395471474,5038863821255945297,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3588 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4672,i,4626917232395471474,5038863821255945297,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4680 /prefetch:82⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD564a7f972e045d1febfb59173d3fd22b0
SHA1af9fe76f06f89f775d9302005bbba59f69564a28
SHA2566cad0a0f913b04359fe046ceb615dcc9971280dd240d86a1359f691d8b55057e
SHA512573b87e6c82bd7dab03b70082be24059192cde61790fda5617057cd2e2885c698b8c58b8e3bed77d893f8475c1aee9779f21d7f2e25c6dffce6633f7e6c07668
-
Filesize
28KB
MD53e9b79ee679b763f743c19eb540aac96
SHA135090af1dd33ee2fa613f355cf5997c6339ad084
SHA2561516abe75e71112753c3327ba728189f6fc381a95931db4b21fb08457db4d5e4
SHA512e2b5d14b497d9a730daa17aceb70ca55803a3e291a36454840b66f4159475aea81bd5ee91e93c2524e2d0ed64edf61e4d8108a42c76bb1593b587e499902ab23
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD58843e54efc1ff1b4576d5b8188aec702
SHA14f0c368fdff53b7008c06f5c09927d3c729760bb
SHA25602f159719ba6a353e2a7f1e325b79d99b88ac63f41bace3ff2b82a1bbda499cc
SHA512f039c56c4b8da0039db12d83a2c06aabcab335137c2a7ce1a217f2f676a3fdb939c3ca0cdf6037c25c94a23a00dc70a64215a6c5443b9a818a4eb8d7175c19c7
-
Filesize
9KB
MD59029ade5e39f2815a8ab7c1790fbd882
SHA19bc258f839288d26a1dc65365ed722fd977891ee
SHA2565d382db33bb465b6ccf417773b0ea73a339f1b4e93628f95c537242e5e0f1690
SHA5124a05296ecf7a970bf4690d4a32db8d6af30cfc4d2c598538656d75812a9c7124e000d657e2b0596892a59fd6ac298efb637bf3d6a5eb2868583848e1d15c7c9b
-
Filesize
99KB
MD5a1af486d6f91f7add1c934fa670c9ab0
SHA1f87f6b139c25f919d952e8ed069db2f3872f6ded
SHA2565364b7700a238b715d25d1322833d64d339368d2c3380b2cf7f493273a4d5d28
SHA512757293bd3030724f5b82b6a7ed26fa9ea511989c8a674b7cc3b22074035c949981926ffe9d718259edefa8d4b00af0235436a98159754a837fad4051ed9d85ac