Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
bypassed.exe
Resource
win10v2004-20240802-en
General
-
Target
bypassed.exe
-
Size
90KB
-
MD5
5d046cd83e8e4bbb64ca82a250e90ea8
-
SHA1
231c777db2aaa5677953a275137e8959ecc447ff
-
SHA256
049ea73a545bf2c262f03a53e2c54020dbf3314b694d37d0d0255768c73cbcf1
-
SHA512
6c6f5ab99735353b65eed9efd7b3f5cd90f5879cdc67856384be9aa22022377404632bea26b7c26ae771f07515251a67c360da7d3d76e76091a729d2d4bfeb87
-
SSDEEP
1536:j7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfNw3ON:/7DhdC6kzWypvaQ0FxyNTBfNr
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bypassed.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133700068837166470" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4464 4144 bypassed.exe 84 PID 4144 wrote to memory of 4464 4144 bypassed.exe 84 PID 4464 wrote to memory of 4880 4464 cmd.exe 85 PID 4464 wrote to memory of 4880 4464 cmd.exe 85 PID 4464 wrote to memory of 4408 4464 cmd.exe 86 PID 4464 wrote to memory of 4408 4464 cmd.exe 86 PID 4744 wrote to memory of 3688 4744 chrome.exe 100 PID 4744 wrote to memory of 3688 4744 chrome.exe 100 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 2288 4744 chrome.exe 101 PID 4744 wrote to memory of 1068 4744 chrome.exe 102 PID 4744 wrote to memory of 1068 4744 chrome.exe 102 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103 PID 4744 wrote to memory of 2984 4744 chrome.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\bypassed.exe"C:\Users\Admin\AppData\Local\Temp\bypassed.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\9673.tmp\9674.tmp\9675.bat C:\Users\Admin\AppData\Local\Temp\bypassed.exe"2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\system32\openfiles.exeopenfiles3⤵PID:4880
-
-
C:\Windows\system32\certutil.execertutil -addstore "Root" "C:\Users\Admin\AppData\Local\Temp\certificate.crt"3⤵PID:4408
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc1941cc40,0x7ffc1941cc4c,0x7ffc1941cc582⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1860,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2060 /prefetch:32⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2320,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3296,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3716,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4892,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4952,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5040 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD55ba5b6c0fde90601e3c165e2aba0e256
SHA15df19f48a2723f6427bda741649165c318462f17
SHA25666fa725befb645ccc3039d6dc79d62828d8499ce11286a70c308f91b1ce8e906
SHA512c390bfbaf777d869a5ca9d45174585d5003947dba7d94794f5895030ff76caf4ced4e4c73fe499ae232fe0b8950e87f22b2d8bba90f15998e14ea6d44457b1e1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5f662367b6a50f9d06fd798978c68eb08
SHA17c696a99245a3e6b6a05b5af733ba2c04799d310
SHA256826116973dd7e043e418a26b2040d93f2fd43a2db9d3b85deb8a93cc5570fe20
SHA512c878490206c5d2e7d083500b2b81caa46d6eddfeab7f99da9e362ffc33e7f3448687f77611cc0c13ad7371b7ece71c7f7e9a7de864ea43ea0a083c16a81d5b8f
-
Filesize
9KB
MD5e24bd1f0b435ddf05bc8624288d2042f
SHA1825cf11bf113195dfbb11145d98ee6d0d6891834
SHA25644e80863ecd2fb134dbb490fea227e0b4d181256733669613644853ad22d4737
SHA512d3f21aa6e41a74fb9f89de0f488dd8c67ab6c68a5993d72fead0882bcbca5c8cf0f7e273aafd076cf2a72a89994f29f5834f61da78e37f848e028b9093f63668
-
Filesize
9KB
MD5b98cf031be2b39ee90e0b9ce99af7297
SHA13e0d05dca541de8fc9a837c3d4aa41381da443af
SHA2562f33f7e1153f8faf40bdaed2452cd50149309060d38c64b83030b8f894b30122
SHA51298cdee917732cb1964f54e1bc7226609849ac67dddc34efcf6fa3cb2be9425f6c64897f1c6e158fd804ff75f0c49e307a4513052d0aa064c45ea98eeb93e2173
-
Filesize
15KB
MD50a5e9466214c5677120a3f273c42fe0f
SHA107edce591e9b728b6217ce308f9736a2f9857d4d
SHA2561ccc3e81a6d7bc03a5218cc7376f5ae09b08967f4f18467b03031dc9001cb0fe
SHA51256b06ea2773066197666a9924a64b5df214015b6fc822ababfd9e6826238dfb9b75fab8e2e96a6ff84a9217e2e1ac8c888c506f377c6c5d8d228d1b52e7dbf85
-
Filesize
205KB
MD58a2df7b5c5ce66441a7cbccd6ee325f7
SHA181a2e26a94c9da9d2e8c8d904057b483e17fbc97
SHA25681b79d2aa33bb37dfcd9c09ccd6f4abc6649d81151e56e48bda89005e668650e
SHA5128cef5157ee8da114f7f89285a23199150daf054ba2b352276c5ac01754ba5e1cd8643854e142a6e5ce0f463d50352f2dbac9a62fb450f9e828048a37af079bc2
-
Filesize
1KB
MD54139d82b7887de939696e636b8c4a86e
SHA142ac906cc609814eb6cc27d5d0ff93c25ff842f2
SHA2563c5bee69f5de7ccf115c18fe5d908a8a8f6232178f5af7bbb74a8efeddf85647
SHA5128ddb01874b1c1e37780dfe4defaae393d65e8102ba9f4d0ff67c88694aea5167402b2c748e18078c15924583418bae6fa10a627868f2c94528519bd803103ceb
-
Filesize
1KB
MD5d3a34187a3ade2feeb0164910bedc348
SHA1ef5d6a667b344b4591cd620728b0cd82a0cc7d9c
SHA256e97e0209d668ff9dce7f03c4c9cbd40267c0bf0dbff72a0b0bf137ce55fdd543
SHA51270a511c80096f62dca1cc8fbe3c41399c76a9edbc7cf6433a4649ec43b3db26259ac93bde95c106b73fe666806c0ae6c8df9810c55aec0c65e2de4ea7d33e2b0