Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
102s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/08/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
Debug/toddlerkick_interface.exe
Resource
win11-20240802-en
General
-
Target
Debug/toddlerkick_interface.exe
-
Size
10KB
-
MD5
876942ce153b65566b1dffe7a95e76c5
-
SHA1
84c115966a6e5e861f8a0b108ec9b86abfa9d2aa
-
SHA256
d930e485f6aba7de93bb83ce0f8f0d555d8218440626343cd3ea68436231d0d5
-
SHA512
a8f923ffba62f357a4fae5fa2c8d910dded9631ca70422a77b491203ecdf570dfb8bd616a2b702dee2d8c63969b94618d5efcbe16827dd678d12d2e112288d3a
-
SSDEEP
192:bTz5egvTw5yBHZZZLgA9tsoH86ls9V1YYfWJeP:NegvTw5AxttsoH/gVvf8e
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toddlerkick_interface.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687175306340046" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 chrome.exe 2868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe Token: SeShutdownPrivilege 2868 chrome.exe Token: SeCreatePagefilePrivilege 2868 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe 2868 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4644 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2120 2868 chrome.exe 83 PID 2868 wrote to memory of 2120 2868 chrome.exe 83 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 3384 2868 chrome.exe 84 PID 2868 wrote to memory of 896 2868 chrome.exe 85 PID 2868 wrote to memory of 896 2868 chrome.exe 85 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86 PID 2868 wrote to memory of 1824 2868 chrome.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Debug\toddlerkick_interface.exe"C:\Users\Admin\AppData\Local\Temp\Debug\toddlerkick_interface.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5000
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4644
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ff81828cc40,0x7ff81828cc4c,0x7ff81828cc582⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1800,i,16725783671929854541,8626704389547449683,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1796 /prefetch:22⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,16725783671929854541,8626704389547449683,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2112 /prefetch:32⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2192,i,16725783671929854541,8626704389547449683,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2208 /prefetch:82⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,16725783671929854541,8626704389547449683,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,16725783671929854541,8626704389547449683,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3092,i,16725783671929854541,8626704389547449683,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4452 /prefetch:12⤵PID:496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4772,i,16725783671929854541,8626704389547449683,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4852,i,16725783671929854541,8626704389547449683,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4844 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD528a49382d97953d37429920995e11e7a
SHA1e0d2a307224b13737450aaa9e8f5a9571ea2ff8e
SHA25685bcfb4425aa4e689e584514b91d7abedf8851a54e078fa049e93a79fbaf9b71
SHA512d0e7febb30d2a194989a0732aae060c5d4e82b31141877ab6f396851c8ba9c430d5a63e4ed6aec530720c226640ff468d85ceb2545f223a4cea9edb98894313e
-
Filesize
1KB
MD50a75a3f45ec09e2e9b9cc134aba46102
SHA1c4fd4cd765a1a019ac9cc275d8be6ca926d4ed5d
SHA256210661f0cacfb091bbad62e6d70bee333be2b27f4dcbc1a19a941451598e759b
SHA512b53b3f6e0748eab131e78ed202a863c5e8f945d0d1d89d9fce5b28b3b29b4c458f14c1453f360f6df9f1d2e6548f5d069a182451d99d91fec750078bcf0709d7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5df12cdab127dfcde64dfb5070afc19de
SHA16912df3f9ccbfca9d1d18d0dd0ff73cdcd1c411b
SHA256585b25fe8c990bd4c55be8512d18a4d5b1b8d97dc40e2d7c9fa18aab91bd3ab6
SHA512dbf452ee6eaa98d1c0277747bfc9b636e55547a7020e0ef7dee2a4b4151352c925720ae23ce17227e3017ae76ee0bdf45ed62c02a3d170ce2231a95c4f125678
-
Filesize
9KB
MD5cad9c37b6d3eb697c92d5c6930b64542
SHA1b17b8a9bc1264282c26be0beb528e859a7ca6510
SHA2562ace49688fe65c62df32d393fe9c40f726b83e978f52e09944630f0b4f259f45
SHA5124847326eb0f79e42e98ac78f6e9bf226b90d7d22f3c50330ef63ac796dbff52fc8105fc4de6856fea2689413ff9b0f7e506dd397c39df9caf2b16eb699b21adb
-
Filesize
15KB
MD55e51605d7a58b74c5968f6d403e189d8
SHA1baf4ceb3e79cc3d4174e7e910a5e43f9dd8e844d
SHA256d058f9b5a09b6175d408047f45b7c29b8998d22367521c2b4544f20b2f97b924
SHA512ac8e2fd813aec4a1d608edd4e631fa969a2eab018d0c8f5ad3880ff0e511063bc4aa4ced0d173f23c0736f77a61c6b527df2e96f52795885a06ec66708068015
-
Filesize
201KB
MD58d6a8000f2f4f5bd7cf804f32ef0ba35
SHA17f7634f25410094b592adc887f5ef9cd74e48c0f
SHA256a76783b0aa53afae3fe7c856667b9c15a3ac7c6643af4d0cd448119e4e76a6d2
SHA512050f36b15bc13e19f2ef982ab9e1dd0ee0d07e6d51e390a08eaec5f0e35c254604478ac0fc9fc2b3c255674eb4e507954676e3575f8e317dc4ba2d63bb985492
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD541ce6cd728e8893a0387cd1d5aaf201d
SHA1c6c5257c73d52968b03fa7a332f61f050229999c
SHA256c6ff6212cd4c01ff44605a8339568c3ed2b9dd85c7956873ee9db592e24b654d
SHA51273c40effe3fa0c521cdd5347e85ac142666a5a7b982d96c80f4c08c079d2f5a8d58c12644af20f27b8480040eb74b28d0696be16fc9566c02bf2d60d08839c27