Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/09/2024, 15:27

General

  • Target

    PageViewFlooder.exe

  • Size

    6.6MB

  • MD5

    f379569c86b6bc411b188d23f5049fb8

  • SHA1

    701a98de87c44c523bca1352f445aaea7ddda1f8

  • SHA256

    08b1f7f575e70eb26e502e940e107aff26c85fedad5f71919ccca855eeaad6a1

  • SHA512

    89fc1245cd2e571ae3b6e0a4854b4469c51c0bdc54f54340bf874f72d01898f4cd0af9f09b3b1cb1cdce167e3abe5f1dffc4c9904f9130c40e9112036b63a7e6

  • SSDEEP

    196608:rYieIs9onJ5hrZERlyiU8AdZYJERurTEtrdCXXoQ3qbPe:Ews9c5hlERJAdZYygro9dCXX

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PageViewFlooder.exe
    "C:\Users\Admin\AppData\Local\Temp\PageViewFlooder.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Users\Admin\AppData\Local\Temp\PageViewFlooder.exe
      "C:\Users\Admin\AppData\Local\Temp\PageViewFlooder.exe"
      2⤵
      • Loads dropped DLL
      PID:2188
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /im chrome.exe /f
        3⤵
          PID:4996
          • C:\Windows\system32\taskkill.exe
            taskkill /im chrome.exe /f
            4⤵
            • Kills process with taskkill
            PID:4640
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /im chrome.exe /f
          3⤵
            PID:408
            • C:\Windows\system32\taskkill.exe
              taskkill /im chrome.exe /f
              4⤵
              • Kills process with taskkill
              PID:2032
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /im chrome.exe /f
            3⤵
              PID:4616
              • C:\Windows\system32\taskkill.exe
                taskkill /im chrome.exe /f
                4⤵
                • Kills process with taskkill
                PID:1036
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /im chrome.exe /f
              3⤵
                PID:3196
                • C:\Windows\system32\taskkill.exe
                  taskkill /im chrome.exe /f
                  4⤵
                  • Kills process with taskkill
                  PID:4636
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe"
            1⤵
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:624
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffac8549758,0x7ffac8549768,0x7ffac8549778
              2⤵
                PID:164
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:2
                2⤵
                  PID:196
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:8
                  2⤵
                    PID:2196
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:8
                    2⤵
                      PID:2836
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:1
                      2⤵
                        PID:4576
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:1
                        2⤵
                          PID:3828
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4484 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:1
                          2⤵
                            PID:1996
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4748 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:1
                            2⤵
                              PID:3724
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4936 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:1
                              2⤵
                                PID:5056
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3180 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:8
                                2⤵
                                  PID:4408
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3476 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:8
                                  2⤵
                                    PID:1832
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:8
                                    2⤵
                                      PID:1392
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3440 --field-trial-handle=1884,i,15966666188220799740,5749361148563055289,131072 /prefetch:8
                                      2⤵
                                        PID:4160
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:1500

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        384B

                                        MD5

                                        e9ce92af8ec7b26d0547fa7bf21baad0

                                        SHA1

                                        c7e74c7604ade7e0139bff96b1890011e315f791

                                        SHA256

                                        f928088dff9602b3c136b166898c04c9cc7b32e7a60f5c8d596bbd9f6a14bc75

                                        SHA512

                                        ec13b32d8757e4d8190c52d4c31e26f9c4f453eadd4cd6e528cf7b7f9875030b1c7faa2165ea56c84d6966315c863e20737fd7c5308b25e472380d0917c732d0

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        538B

                                        MD5

                                        a41eea8246a8dd19e05b817a255c8cae

                                        SHA1

                                        e5028effffcb14d54c1a79934531c26be3f40bf8

                                        SHA256

                                        ee01a71818eb637edeaf1c69f341cb87644f1e7d487b0b265ea74209c642b563

                                        SHA512

                                        003634276f3e9759e4d172ce8b583822fccbb490e1223bf7cf8859cd1863b5bc221aee9b69cca25156a65910aec319189474627911f5d20460a69dae27e65435

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        720156e80a4faeca04679dad0bc08a7e

                                        SHA1

                                        b33c7eb7e55d5969897af50dc10933fab9b49f72

                                        SHA256

                                        ac8751dc99b00bc489a4934a2629bd60af54932137eaa1ea582db6732c53ae9f

                                        SHA512

                                        8242b2ed52cf255893fdb93765d83b851a45397a4472d9ac667a4d0fef2f5cd240b943d56844aa1937aabd31120238056ffad4cace8e5c57c750d2f66118d7d1

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        33dbb501195d327631ee83ee0ad4f1e5

                                        SHA1

                                        6bdfad20d41ef8b29c99d58670e65bd3a6beef1e

                                        SHA256

                                        c0d8d7d7e3a17e0076a436ea7ee71b4fc5312809c6c5dbc6818893e8acebf14e

                                        SHA512

                                        a2386b8903e7f5cd7e6fac153834b2193bd96ee134a03a1ae909e6a9871cc1c1729a27d3c1412cbe91e03c15f16d2557151c9287f8f4cba87d158871362e1891

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        150KB

                                        MD5

                                        2e4c88fb313bd4d9aae850591d693e6f

                                        SHA1

                                        dbb126ac05b615f636e28cc9d1bed11c3152fffa

                                        SHA256

                                        64da2abbd7dd9d353ca5c7ec5515023e3472b191520b4e9434be75c77abb8aa9

                                        SHA512

                                        0f76900d511a174e27512c09319896a4a0a11f41c1ec412f065113a37cbaeb595bb0b6b1ee3d8552f08421dd110499a84e9a2031eb6afe076fd4d36645e3ff1d

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        316KB

                                        MD5

                                        b1ea311a6dcfe8905cdc925b3c093a34

                                        SHA1

                                        f6fffe829b5d6d80695d94544c09a002827048e1

                                        SHA256

                                        38d04049646e7118b1b6d5f02e456ebc48f172347db80b8efa2b153fd1f185c8

                                        SHA512

                                        eb7ab72f95efe4bb782859ae0499a52a7ffcaf217416ed7099aec7426f991260f22d858506e854f68f9c2c5e00265ec2e1f3fa40d934740565d07f0393532c38

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                        Filesize

                                        2B

                                        MD5

                                        99914b932bd37a50b983c5e7c90ae93b

                                        SHA1

                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                        SHA256

                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                        SHA512

                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI38162\VCRUNTIME140.dll

                                        Filesize

                                        99KB

                                        MD5

                                        8697c106593e93c11adc34faa483c4a0

                                        SHA1

                                        cd080c51a97aa288ce6394d6c029c06ccb783790

                                        SHA256

                                        ff43e813785ee948a937b642b03050bb4b1c6a5e23049646b891a66f65d4c833

                                        SHA512

                                        724bbed7ce6f7506e5d0b43399fb3861dda6457a2ad2fafe734f8921c9a4393b480cdd8a435dbdbd188b90236cb98583d5d005e24fa80b5a0622a6322e6f3987

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI38162\_bz2.pyd

                                        Filesize

                                        83KB

                                        MD5

                                        6c7565c1efffe44cb0616f5b34faa628

                                        SHA1

                                        88dd24807da6b6918945201c74467ca75e155b99

                                        SHA256

                                        fe63361f6c439c6aa26fd795af3fd805ff5b60b3b14f9b8c60c50a8f3449060a

                                        SHA512

                                        822445c52bb71c884461230bb163ec5dee0ad2c46d42d01cf012447f2c158865653f86a933b52afdf583043b3bf8ba7011cc782f14197220d0325e409aa16e22

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI38162\_ctypes.pyd

                                        Filesize

                                        122KB

                                        MD5

                                        29da9b022c16da461392795951ce32d9

                                        SHA1

                                        0e514a8f88395b50e797d481cbbed2b4ae490c19

                                        SHA256

                                        3b4012343ef7a266db0b077bbb239833779192840d1e2c43dfcbc48ffd4c5372

                                        SHA512

                                        5c7d83823f1922734625cf69a481928a5c47b6a3bceb7f24c9197175665b2e06bd1cfd745c55d1c5fe1572f2d8da2a1dcc1c1f5de0903477bb927aca22ecb26a

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI38162\_lzma.pyd

                                        Filesize

                                        157KB

                                        MD5

                                        b5355dd319fb3c122bb7bf4598ad7570

                                        SHA1

                                        d7688576eceadc584388a179eed3155716c26ef5

                                        SHA256

                                        b9bc7f1d8aa8498cb8b5dc75bb0dbb6e721b48953a3f295870938b27267fb5f5

                                        SHA512

                                        0e228aa84b37b4ba587f6d498cef85aa1ffec470a5c683101a23d13955a8110e1c0c614d3e74fb0aa2a181b852bceeec0461546d0de8bcbd3c58cf9dc0fb26f5

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI38162\_socket.pyd

                                        Filesize

                                        77KB

                                        MD5

                                        f5dd9c5922a362321978c197d3713046

                                        SHA1

                                        4fbc2d3e15f8bb21ecc1bf492f451475204426cd

                                        SHA256

                                        4494992665305fc9401ed327398ee40064fe26342fe44df11d89d2ac1cc6f626

                                        SHA512

                                        ce818113bb87c6e38fa85156548c6f207aaab01db311a6d8c63c6d900d607d7beff73e64d717f08388ece4b88bf8b95b71911109082cf4b0c0a9b0663b9a8e99

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI38162\base_library.zip

                                        Filesize

                                        758KB

                                        MD5

                                        67d863a39e90cd2fa3c20f4b06ce8397

                                        SHA1

                                        98a2e831f22a29d72850d1e7a3de863892dadf5f

                                        SHA256

                                        02cb3daf59557ea5b992663a29eee8e9ac3241f55d3f34a3fc829be19a381b1b

                                        SHA512

                                        ac0536c7138325ff311fb6b7dcaaea0629c3535666b42097232a80046bbc8790b0d84e1b4164f7a4f675e47cd5fd4a28d0053714f44a3452297f05f30109fd3d

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI38162\libffi-7.dll

                                        Filesize

                                        32KB

                                        MD5

                                        eef7981412be8ea459064d3090f4b3aa

                                        SHA1

                                        c60da4830ce27afc234b3c3014c583f7f0a5a925

                                        SHA256

                                        f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                        SHA512

                                        dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI38162\python39.dll

                                        Filesize

                                        4.3MB

                                        MD5

                                        11c051f93c922d6b6b4829772f27a5be

                                        SHA1

                                        42fbdf3403a4bc3d46d348ca37a9f835e073d440

                                        SHA256

                                        0eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c

                                        SHA512

                                        1cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI38162\select.pyd

                                        Filesize

                                        26KB

                                        MD5

                                        7a442bbcc4b7aa02c762321f39487ba9

                                        SHA1

                                        0fcb5bbdd0c3d3c5943e557cc2a5b43e20655b83

                                        SHA256

                                        1dd7bba480e65802657c31e6d20b1346d11bca2192575b45eb9760a4feb468ad

                                        SHA512

                                        3433c46c7603ae0a73aa9a863b2aecd810f8c0cc6c2cd96c71ef6bde64c275e0fceb4ea138e46a5c9bf72f66dcdea3e9551cf2103188a1e98a92d8140879b34c