Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/08/2024, 13:23

240814-qm24tsvalh 9

14/08/2024, 13:20

240814-qlel5sthnb 5

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 13:20

General

  • Target

    idapro.exe

  • Size

    192KB

  • MD5

    05d5875e19e172b49adc9d0f04ccae46

  • SHA1

    c2f617a38218ed18ac5350416789de87ccfa4606

  • SHA256

    c595e3530c8f93a8021ef1e23ce9031c1a989cda64dc9b51e8ee49ceec4e275c

  • SHA512

    311cbd9eb728b42122b6d7e44c6a2dd5299c664fda3119e7c88adb12d1e42f9a347d330e1bd5999391c7fa5870a0ce6a712b7274a688c1687d666a04998bf7a8

  • SSDEEP

    3072:ga0D9sxuuOcBrBAxIRhepq94PIbBr9r8mJTQSaMm5/6QGC/3Kh4QLs46Wn2O:ganxutqrmxBpwrWlTKh4Qffn2

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 56 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\idapro.exe
    "C:\Users\Admin\AppData\Local\Temp\idapro.exe"
    1⤵
      PID:812
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffa9ef2cc40,0x7ffa9ef2cc4c,0x7ffa9ef2cc58
        2⤵
          PID:4488
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1884,i,10898736558512302589,14716272402396289214,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1880 /prefetch:2
          2⤵
            PID:4328
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1996,i,10898736558512302589,14716272402396289214,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2192 /prefetch:3
            2⤵
              PID:2188
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,10898736558512302589,14716272402396289214,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2272 /prefetch:8
              2⤵
                PID:3320
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,10898736558512302589,14716272402396289214,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:1
                2⤵
                  PID:756
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3432,i,10898736558512302589,14716272402396289214,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3436 /prefetch:1
                  2⤵
                    PID:1460
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3804,i,10898736558512302589,14716272402396289214,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3704 /prefetch:1
                    2⤵
                      PID:4320
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4844,i,10898736558512302589,14716272402396289214,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4860 /prefetch:8
                      2⤵
                        PID:4232
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5012,i,10898736558512302589,14716272402396289214,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4884 /prefetch:8
                        2⤵
                          PID:5112
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4928,i,10898736558512302589,14716272402396289214,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4872 /prefetch:8
                          2⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5996
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:2236
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:2852
                          • C:\Windows\SysWOW64\DllHost.exe
                            C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                            1⤵
                            • System Location Discovery: System Language Discovery
                            PID:4112
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\main.cpl,@1 ,
                            1⤵
                              PID:3832
                            • C:\Windows\system32\control.exe
                              "C:\Windows\system32\control.exe" input.dll,,{C07337D3-DB2C-4D0B-9A93-B722A6C106E2}
                              1⤵
                                PID:5572
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL input.dll,,{C07337D3-DB2C-4D0B-9A93-B722A6C106E2}
                                  2⤵
                                  • Suspicious use of FindShellTrayWindow
                                  PID:5604
                              • C:\Windows\system32\control.exe
                                "C:\Windows\system32\control.exe" input.dll,,{C07337D3-DB2C-4D0B-9A93-B722A6C106E2}{HOTKEYS}
                                1⤵
                                  PID:5680
                                  • C:\Windows\system32\rundll32.exe
                                    "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL input.dll,,{C07337D3-DB2C-4D0B-9A93-B722A6C106E2}{HOTKEYS}
                                    2⤵
                                      PID:5716

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                    Filesize

                                    649B

                                    MD5

                                    c4603656e4fc07a44d437d7b0c8358af

                                    SHA1

                                    43b7a9f06271480f823313f57efe56e1a29f4269

                                    SHA256

                                    367f38bc71ce656b6665ff9203522c31c6d3dbb4aee569dfdde1110216caa4c4

                                    SHA512

                                    8a009aa5572f99d387d6ee15b339ee229f5699043e4c4188a3031fa6dbd4db9d14897d5f6b9052e6f48c8a3c19d95cbd34f168043190f4dcb06a8c67408db47f

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    5f8d2e904a43e84be6d2f6a4c9bcc82c

                                    SHA1

                                    14aa30d2e38bf71af4536dc19f7ef9b80fed7791

                                    SHA256

                                    efbdafb0bb17a157e599a96583a6ac8cdff0912cc365530a376a458806b64092

                                    SHA512

                                    ea7399ae83224bd101eaf470e52fd055e6df97a5fdb2fd8b85e5d37d789429a3ef4905ce0b922789c88a4e8169728ad524a6ca6987adbe24698aab07973893cb

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    356B

                                    MD5

                                    c55f49b2ab1e1ffed4d1d4c7a493b2f4

                                    SHA1

                                    b08b1214d347edaa382a0d6317d672c3aeb95831

                                    SHA256

                                    854ba991e6e7d9ef5a85baa5f3bbb0e769df57749a7fa00e895612bac1ab4b0d

                                    SHA512

                                    e15019e4b5962ac6ad2dcd617ffe8d8ea3d9b8a6f4ce69f6fe087e46c53cc4bf78dbca5d0a79fb146391a3166cb1139983cbb1c534cb8ea230fe2779d3088947

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\a52feec0-e36e-4f76-95e4-0311ef9ec4a5.tmp

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    fb53b0a2121241a6420eb531e34670f8

                                    SHA1

                                    77704b0232ca8d5d2dfc410706bd3bb5467f0361

                                    SHA256

                                    d340d2702dab85818f117aa841e63156e1371991812c7df91029e33d1e95ef52

                                    SHA512

                                    ddbe1cf4f9e1920be9da60c73daac0d6e5be80b01e15e76f9ba9399a829ba8b6be18041d6944df15f5439aa853efa8d019d74727f6405390a2f9698909d68b25

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    c0073da9664800024bb77147c7ba02cd

                                    SHA1

                                    99880a8bfcc0a32c57ed85fec8f03b228a8ebe6e

                                    SHA256

                                    734eb5d7bc5de2b3aae947a1230385c5fe26ac4b956e3afb354a91d06ed5ee21

                                    SHA512

                                    5c9f1c217e09271aa5c8219405a7d683942cff8666b4313c8924d5f9a01900556703ce937e360a37769501c83c18b60a7bea2063f40d48705d61eeb4390d1b5e

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    8KB

                                    MD5

                                    71bf8219d20bbd5766317f2b5daaf557

                                    SHA1

                                    e38902ad38da9ca7cefb12482450131c9844434f

                                    SHA256

                                    d10d3e46d9ab3b8ea518bbb7dea151cd74f7e81bc3ec647bb83733673ff106a6

                                    SHA512

                                    b808a686210b2831e390610c7f71dd289a9cb3dc362b18f4dc6046e313c6c778d8e1ea615c019b81889917348d8314c2906eee2e737ab92534ae5e34e283fbba

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    1eb11253c0db9a3c1dfe65393ccdcf87

                                    SHA1

                                    501dceb21ff848bab46b7e9b1e0b021e0b666517

                                    SHA256

                                    96428e267c86898286f45a98cb07b6c6fd9eb101c1ccc2efaa3ec802d0e874ed

                                    SHA512

                                    7b7cddfcf24dd37770f15e5d4f05245fdcc309c5025ccfd6871fac8fda26531e8159f79ed718d4ca38039fde60ca00b49f42abb604293471dba3a46cbedc8a59

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    dfe522991abb606146b35fcf8dc561c9

                                    SHA1

                                    4cc78fd05691954b4735b558bb3eecdead34069e

                                    SHA256

                                    cfd9a72448ea205f23733dd457df77eb0b45c0c6f4f9d92de663ab0bb2d51b99

                                    SHA512

                                    8ae8bd0883f3f60ce9f92a2e46921420104ce3488a0da7aaceaadf05391df18e25b57977641b1bb264b1f1cfd51b0e17449821c091f9f6cf98cce1692bc8eb79

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    8KB

                                    MD5

                                    e472f50ae8b133a96683561b133694a1

                                    SHA1

                                    bcac3cf140c510ac5e7c77459d4be1faae3a6e6c

                                    SHA256

                                    24f16ee2ca81e2dd9352bc81a154dea3ea5ca6880b1c0785340c43bee310ccd2

                                    SHA512

                                    2f687593e74dbb40983313a3abdce4e196332f69d897e97e35f5b789df9fc42962c6611476f3671d9cd7d60334235c5691ed2409c37e955396da9756077e8c27

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    7baac0ab48816ef604df9c95ab63a393

                                    SHA1

                                    2c674c7c87f4737dca0d239a72699b8d3d701748

                                    SHA256

                                    e3df33e0cb74e969919cc93ee9b7b9fe435c98d696e5c167378d712419e3b4be

                                    SHA512

                                    6ea9765f486d0d26ded897c5bc4b6d0f6c08ff5c3e1ff532a85af4b6040aa1c1a73282d53551ecd9246c0bb33d40719e76bb8f578d71c7a4ab67e12f5eb87277

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    d27898577943a9044a71624118e5ef68

                                    SHA1

                                    0a405fbc603c7820c475e0516aba444990346b6a

                                    SHA256

                                    154650a49ca7bcd916e33fc19cd1684cdf1e054910136d3e1f9c979fba305568

                                    SHA512

                                    f30a6e9fb4b6801c2c9cc99204966910096d91a51623580f7ded9cb63ae590f5735add34b9a79772aa51254b2ca9575b521d654d31fb460ef78c53a440eae953

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                    Filesize

                                    15KB

                                    MD5

                                    a617a042e88091f2a5ebf267c3375323

                                    SHA1

                                    480d6562bc300043a9685870df60029303bfed4a

                                    SHA256

                                    051e06876e94926e7ce8e47b5c0c89e2256053a87deabdc7ce2700d08df48e41

                                    SHA512

                                    a87d8164a90bef7c47effe1d9d552d5430296692e06a83dcbe13d5a700378405bec0bf5360db9a31d4380429594e7e7ecf56892608a18fd1aa64bdcd16c4dc63

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    194KB

                                    MD5

                                    f770841d558bae84ae22cb16be0f9e58

                                    SHA1

                                    3a8dad7fd4966654884d7e36c5241e08a5baae61

                                    SHA256

                                    fdb972d4b6bf0bc36334bfca038099fc3186c1b9cf234695f59a0e189312358c

                                    SHA512

                                    381f43f3f55460172b86937fa757eb53a4103f95629816b8b588bf9f7dae1a6237eeb5289aac8bcbe4c2233ada1201b807ebf90df93c1782a4609b6dae5c76b5

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    194KB

                                    MD5

                                    7738de8e03cd96a6a4596fb9ccf19469

                                    SHA1

                                    daa29b5f98e5ca45b663be664eff3ce6f4425a67

                                    SHA256

                                    53d780439d4164c778fbd404c5b3f37fd2f2fba91159875000d5c7646731b864

                                    SHA512

                                    b6229e781c8442b601c39323d41fd851398bad9d8df02c5704e0371557c54a6704fe576110f34253d4356040973d4ebca6280b573dd49072d19a70389382971e