Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 10:47

General

  • Target

    bypassed.exe

  • Size

    90KB

  • MD5

    5d046cd83e8e4bbb64ca82a250e90ea8

  • SHA1

    231c777db2aaa5677953a275137e8959ecc447ff

  • SHA256

    049ea73a545bf2c262f03a53e2c54020dbf3314b694d37d0d0255768c73cbcf1

  • SHA512

    6c6f5ab99735353b65eed9efd7b3f5cd90f5879cdc67856384be9aa22022377404632bea26b7c26ae771f07515251a67c360da7d3d76e76091a729d2d4bfeb87

  • SSDEEP

    1536:j7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfNw3ON:/7DhdC6kzWypvaQ0FxyNTBfNr

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bypassed.exe
    "C:\Users\Admin\AppData\Local\Temp\bypassed.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\9673.tmp\9674.tmp\9675.bat C:\Users\Admin\AppData\Local\Temp\bypassed.exe"
      2⤵
      • Drops file in Drivers directory
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\system32\openfiles.exe
        openfiles
        3⤵
          PID:4880
        • C:\Windows\system32\certutil.exe
          certutil -addstore "Root" "C:\Users\Admin\AppData\Local\Temp\certificate.crt"
          3⤵
            PID:4408
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4744
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc1941cc40,0x7ffc1941cc4c,0x7ffc1941cc58
          2⤵
            PID:3688
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1904 /prefetch:2
            2⤵
              PID:2288
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1860,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2060 /prefetch:3
              2⤵
                PID:1068
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2320,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2532 /prefetch:8
                2⤵
                  PID:2984
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:1
                  2⤵
                    PID:4572
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3296,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3336 /prefetch:1
                    2⤵
                      PID:1824
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3716,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4576 /prefetch:1
                      2⤵
                        PID:4140
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4892,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4920 /prefetch:8
                        2⤵
                          PID:4232
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4952,i,12241288720116662867,2102311647345195015,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5040 /prefetch:8
                          2⤵
                            PID:4220
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:220
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                            1⤵
                              PID:4868

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                              Filesize

                              649B

                              MD5

                              5ba5b6c0fde90601e3c165e2aba0e256

                              SHA1

                              5df19f48a2723f6427bda741649165c318462f17

                              SHA256

                              66fa725befb645ccc3039d6dc79d62828d8499ce11286a70c308f91b1ce8e906

                              SHA512

                              c390bfbaf777d869a5ca9d45174585d5003947dba7d94794f5895030ff76caf4ced4e4c73fe499ae232fe0b8950e87f22b2d8bba90f15998e14ea6d44457b1e1

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              354B

                              MD5

                              f662367b6a50f9d06fd798978c68eb08

                              SHA1

                              7c696a99245a3e6b6a05b5af733ba2c04799d310

                              SHA256

                              826116973dd7e043e418a26b2040d93f2fd43a2db9d3b85deb8a93cc5570fe20

                              SHA512

                              c878490206c5d2e7d083500b2b81caa46d6eddfeab7f99da9e362ffc33e7f3448687f77611cc0c13ad7371b7ece71c7f7e9a7de864ea43ea0a083c16a81d5b8f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              9KB

                              MD5

                              e24bd1f0b435ddf05bc8624288d2042f

                              SHA1

                              825cf11bf113195dfbb11145d98ee6d0d6891834

                              SHA256

                              44e80863ecd2fb134dbb490fea227e0b4d181256733669613644853ad22d4737

                              SHA512

                              d3f21aa6e41a74fb9f89de0f488dd8c67ab6c68a5993d72fead0882bcbca5c8cf0f7e273aafd076cf2a72a89994f29f5834f61da78e37f848e028b9093f63668

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              9KB

                              MD5

                              b98cf031be2b39ee90e0b9ce99af7297

                              SHA1

                              3e0d05dca541de8fc9a837c3d4aa41381da443af

                              SHA256

                              2f33f7e1153f8faf40bdaed2452cd50149309060d38c64b83030b8f894b30122

                              SHA512

                              98cdee917732cb1964f54e1bc7226609849ac67dddc34efcf6fa3cb2be9425f6c64897f1c6e158fd804ff75f0c49e307a4513052d0aa064c45ea98eeb93e2173

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              0a5e9466214c5677120a3f273c42fe0f

                              SHA1

                              07edce591e9b728b6217ce308f9736a2f9857d4d

                              SHA256

                              1ccc3e81a6d7bc03a5218cc7376f5ae09b08967f4f18467b03031dc9001cb0fe

                              SHA512

                              56b06ea2773066197666a9924a64b5df214015b6fc822ababfd9e6826238dfb9b75fab8e2e96a6ff84a9217e2e1ac8c888c506f377c6c5d8d228d1b52e7dbf85

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              205KB

                              MD5

                              8a2df7b5c5ce66441a7cbccd6ee325f7

                              SHA1

                              81a2e26a94c9da9d2e8c8d904057b483e17fbc97

                              SHA256

                              81b79d2aa33bb37dfcd9c09ccd6f4abc6649d81151e56e48bda89005e668650e

                              SHA512

                              8cef5157ee8da114f7f89285a23199150daf054ba2b352276c5ac01754ba5e1cd8643854e142a6e5ce0f463d50352f2dbac9a62fb450f9e828048a37af079bc2

                            • C:\Users\Admin\AppData\Local\Temp\9673.tmp\9674.tmp\9675.bat

                              Filesize

                              1KB

                              MD5

                              4139d82b7887de939696e636b8c4a86e

                              SHA1

                              42ac906cc609814eb6cc27d5d0ff93c25ff842f2

                              SHA256

                              3c5bee69f5de7ccf115c18fe5d908a8a8f6232178f5af7bbb74a8efeddf85647

                              SHA512

                              8ddb01874b1c1e37780dfe4defaae393d65e8102ba9f4d0ff67c88694aea5167402b2c748e18078c15924583418bae6fa10a627868f2c94528519bd803103ceb

                            • C:\Windows\system32\drivers\etc\hosts

                              Filesize

                              1KB

                              MD5

                              d3a34187a3ade2feeb0164910bedc348

                              SHA1

                              ef5d6a667b344b4591cd620728b0cd82a0cc7d9c

                              SHA256

                              e97e0209d668ff9dce7f03c4c9cbd40267c0bf0dbff72a0b0bf137ce55fdd543

                              SHA512

                              70a511c80096f62dca1cc8fbe3c41399c76a9edbc7cf6433a4649ec43b3db26259ac93bde95c106b73fe666806c0ae6c8df9810c55aec0c65e2de4ea7d33e2b0