Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
41s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/09/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
redirect.html
Resource
win11-20240802-en
General
-
Target
redirect.html
-
Size
6KB
-
MD5
6c24b02322b62a0bde369b05a9c4ac00
-
SHA1
7cb316778f0f09a1c038d5ce2b72827f73efa773
-
SHA256
1c8c8076523d1b18a44e552b870b866a4078b1204d08d44530f1c918bf7acda2
-
SHA512
5e0eaf1de390ef6db4c2519cbbfad69956901e513a65a9f82be358a626bedb0d53ffd62bfb28592074224da812bb480066b3b690951a1d89a178488ca0fc0e18
-
SSDEEP
192:d0HLxX7777/77QF79yrq0Lod4BYCIkMOmXB5:d0r5HYl0+CIkMOmXB5
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133701990940016767" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3508 wrote to memory of 1108 3508 chrome.exe 80 PID 3508 wrote to memory of 1108 3508 chrome.exe 80 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 3384 3508 chrome.exe 82 PID 3508 wrote to memory of 2004 3508 chrome.exe 83 PID 3508 wrote to memory of 2004 3508 chrome.exe 83 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84 PID 3508 wrote to memory of 1480 3508 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\redirect.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff38f2cc40,0x7fff38f2cc4c,0x7fff38f2cc582⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1780,i,5188908139516764572,11240559869370615558,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1776 /prefetch:22⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2012,i,5188908139516764572,11240559869370615558,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2092 /prefetch:32⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2128,i,5188908139516764572,11240559869370615558,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2368 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,5188908139516764572,11240559869370615558,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,5188908139516764572,11240559869370615558,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4388,i,5188908139516764572,11240559869370615558,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4672,i,5188908139516764572,11240559869370615558,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3832 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4640,i,5188908139516764572,11240559869370615558,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3124,i,5188908139516764572,11240559869370615558,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=212,i,5188908139516764572,11240559869370615558,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD53a27482057e5ef24c457c6ac55e785ad
SHA1721f3b09a29fea2c14b053f64fa4925d5961ccc8
SHA256ed6a6b76866494bbc962b51e76aa587cd47059827d99cb808587f001488f87e2
SHA51205296d7b11aa6a12453247e89f9832c0773a83eb4adbac62569584dd29699e2c2fa297ade9e33f9121b52cd80fc6872d4433017381eb85c9397a07ae82ee8596
-
Filesize
1KB
MD55eef55c985cf404587f7f2e66d8c6922
SHA121ac9131288cc1bc5e24bce5bf74b5dab6d095ac
SHA256a122c332f3120aa9913d0122a58ae2b9865e89bbcad009ad801d0289458894aa
SHA512e983564cce2e4976b91ef75e132a3ff7e39dae4a73750759a5dc50ace5d8cd41f58ea174e41bfb23b924f289183741a0269c28fb88a5405bed972d92166c01fe
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5a31e1cdb8b39e530deed48ee6e34d61a
SHA13dc4fc3ee8681990773d4d50bdd21f2c863839da
SHA256314d52d6527fc7631f747e1a0e16b16490263c2eedcf7fd423662ca4008a2615
SHA5123333c93439d8ada07f9cafeec5d5fb107bbabb074f613f75e8fdccb212aebb6c8f171b3fd5f7176897c7368ad002c7ff0a04b03da28b30cddbfa1141f57b2343
-
Filesize
9KB
MD5c33bae65ec27ca78ff1e13054f872dcb
SHA10fd64730911af1f22d6ccf22ba20924543fb9b70
SHA256f79b0c0f3e060401198cb09903a6844feea22c0636560f60aef66623c4f33246
SHA512376ceba53d1e584178c04c7507644368453fb91ac13a348bad7d63f061199fa6d5bf9891392a094006d75219631271cfc98fd7cb274274e3c056c444bd8790df
-
Filesize
9KB
MD519f26a9bec7ebb5fc8a8700f4381f9d4
SHA1419e171acbb2c5e5a2c6f23375597f5681d8a96b
SHA25677fc4f600e1aadc36021a1e3f343db42b57b12f78b56cd90a52bd2193e9aafe7
SHA512a589f6607e0f4459e21c22e4e66157fc9823d884d83c8013434cd18660330ec01ef17c5a8111f055473e009a5f6cfb9feccd8ac8a940bd9d57562aee290a4f41
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f440c2ce-f117-47bd-829f-45683cbcae63.tmp
Filesize10KB
MD58091234e5a2f1cef6ea6642e2c13cc93
SHA190edc600b70c5843d6463b56b689e4803f551274
SHA2567b88f1edd2ad2b3b1df17ab40da04c55d1f6349b9e148e2d5a82d10c9abefd0d
SHA5125660fd49b0eb1028eae6dc5b62893204fa95b17a1a97e09d79e019e4da0c355f517a3b15a28e28fcfb2b58307ef855b8e2ba5efa838807453a8ca50403ae8704
-
Filesize
195KB
MD500843ef3f17352145368df6de5265b7f
SHA19741aaf5f738ccc474072f25180526857db9f6d2
SHA256a5268d21dd60c8fe6b0b7ba34ce89b737d7c8c10f07dcb895ab4502f549cd21c
SHA512674c52038b5ed9fc4adad14bf40bbd5d415ca1b5a03fab10ba82b099418051642afa3b68fdbfccc6f380378684793733e06665d23635a8fd57d773b309a52335
-
Filesize
264KB
MD5743770a19ed37b4ed9ba82447ed4b762
SHA1853c502c421b4fe0bc3c2676efc0e478c74add4b
SHA256d5eeb2928a872076fc18a27db6fd84acd275c17c145f4886210a6ec0c2235927
SHA51283315d17c48e2287be2d0d4ccd49b80ac72a83eea50bd02b36fc2fcb7bb3a31775bb55549bf7e92b9dce1276721f898dee8389be56af73cda82e25603f83f91d
-
Filesize
195KB
MD5b4c2d2fce9f0b31ca377eaa9ae78d9e2
SHA1cfc120d2530b640f6befe26cf6365dd8c0a25d94
SHA256755aa7ff38064bec24f7469b4491f245a65b58fdfa9c37390e38e0aa978386d3
SHA512b10e267434cc2a9a30722cd12f85acda35e7598268f7accd5770d405cffc8cc01c00963bf2839e2c8769887b03c84a77b9196337f5a4a01a5054166f637c6c83