Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    32s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 13:35

General

  • Target

    https://gofile.io/d/FBllC8

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/FBllC8
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff93cf6cc40,0x7ff93cf6cc4c,0x7ff93cf6cc58
      2⤵
        PID:2752
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1864 /prefetch:2
        2⤵
          PID:2544
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2108,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2156 /prefetch:3
          2⤵
            PID:3092
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2408 /prefetch:8
            2⤵
              PID:1532
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:1
              2⤵
                PID:4124
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:1
                2⤵
                  PID:2520
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4460,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4492 /prefetch:1
                  2⤵
                    PID:4140
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4728,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4352 /prefetch:1
                    2⤵
                      PID:4032
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4732,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4852 /prefetch:8
                      2⤵
                        PID:2616
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4688,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4420 /prefetch:1
                        2⤵
                          PID:4644
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4676,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4824 /prefetch:8
                          2⤵
                            PID:4708
                          • C:\Program Files\VideoLAN\VLC\vlc.exe
                            "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\0hd21jkko2s95dc287tgy_source-0EPALfhN.mp4"
                            2⤵
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of SetWindowsHookEx
                            PID:1484
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:2284
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                            1⤵
                              PID:3752
                            • C:\Windows\system32\AUDIODG.EXE
                              C:\Windows\system32\AUDIODG.EXE 0x4f8 0x4e4
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3648

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                              Filesize

                              649B

                              MD5

                              c0290d18a239019845f8bd8269bfc50a

                              SHA1

                              513eb73d3adeb2ddbbfeba7f9146f876325c64eb

                              SHA256

                              2e9ebcf4673f951dd864424325294e272dd8ae68696dcf960791a6e894b94b24

                              SHA512

                              e5867bd1820fab0a58d7f4123411733b2ae68a79dc29c86c38bd194dbb836b00f62e07cef825505daec022e74cb304cbd48fcba784a38c817f3eec96351d37b7

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              336B

                              MD5

                              2fd47c255d1776d12632cf2accd0d44c

                              SHA1

                              228cefb787665f9316ef9413a47d1ad95fc92b9a

                              SHA256

                              46ed9e410182bb681bd64abc7d8d9fe31d0e4d9590f19386e0cccf1e6efeadb0

                              SHA512

                              412717412a17866a96d9117f12d4f874029f4e71414c8cc61ed556027feeb083e59dfe0e36184487f326773df270c20274ac4830f510ef3da95aa5c2013ca558

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              858B

                              MD5

                              420d9cc95acff7f8c531f2cc7fbd0ac6

                              SHA1

                              0d0c8a402f9232162de9d670490ef22709c167a0

                              SHA256

                              fc409045356848348b5bb35f74d4305cdba4e7466e3c6faedcf394cd3e5b3e5d

                              SHA512

                              4fa493e357577de21c7bac17345f7b6cc7b56ea8b87edbbb4376ece51ea83f716b6b6d9eae9518e0011bba6eb6f128d723dca1698d16b676b71dfca994bcccc9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              9KB

                              MD5

                              2e0e1f6a1e50db6495dd7ffb36e56e8e

                              SHA1

                              441093ed14c902f99322c4bc89bb2ef81e986cc0

                              SHA256

                              376a07eaf6a7d7fb407ef28c5f81b33575182e7d519622c870bf4d22fec1b9a2

                              SHA512

                              cd69dabfbd0d1191a733e940c1895cacaf8315ce480760647aa11bea377f542bbc07bee6b7f5983ab45fd4820aeebb51794852e0878b1110c819f5aefaec26a1

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              9KB

                              MD5

                              11ae4fb038167e3db1030be5d5957199

                              SHA1

                              b6fc7a6c5ee39c3104e936a0612c0a27254b7289

                              SHA256

                              87b036ff5647cd9f7d91559e148c4e4d252fe3b3e0d8a8b0c4efd86d95a94c21

                              SHA512

                              2060ea0e8decd5814551799aeb045535573b54d8a340f12ef1f36d7bdc56d92a7e6682d95ddba997bfe655d5f46d7b3ce7b59ed23a0b3e2bb991216b5ffa399e

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              99KB

                              MD5

                              afdfb38d67cce038f862ce98eb19306c

                              SHA1

                              ead04e13d07764de27dec81fc8198bb278963efb

                              SHA256

                              9fb6d016635cd189e953ac30b4d8849d828f80067d107d036bbdf8f28991b39b

                              SHA512

                              866fbb4afa0eb9c747197fa02b10f8ee1d3f9449ab1f29967275d774b2ca0739572885036328c2f05f4a03ffe3800a7e95edd1abfcbd72f4380d2059d10d9d79

                            • C:\Users\Admin\Downloads\0hd21jkko2s95dc287tgy_source-0EPALfhN.mp4

                              Filesize

                              19.6MB

                              MD5

                              98977de3a2c484946cc6ca61f8e3843a

                              SHA1

                              609fc899ae1351d2925d47852285a8f39a513f4b

                              SHA256

                              e02bf97f2d9aae51de83f1b243d0f4c4e562bb908872582f29b7e77fc38f8ccb

                              SHA512

                              65d46d5ea86f8b5f7c1c87c7e0ab9dc71444e2756387d3688414f8c210dac6b788365ff22bbd71b71d09c3e1622dbf0e30f9d8711678fa5a591ee522662ad02f

                            • memory/1484-118-0x00007FF92B4E0000-0x00007FF92B4F7000-memory.dmp

                              Filesize

                              92KB

                            • memory/1484-129-0x00007FF928F20000-0x00007FF928F31000-memory.dmp

                              Filesize

                              68KB

                            • memory/1484-114-0x00007FF92A320000-0x00007FF92A5D6000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1484-121-0x00007FF92A2E0000-0x00007FF92A2F1000-memory.dmp

                              Filesize

                              68KB

                            • memory/1484-120-0x00007FF92A300000-0x00007FF92A31D000-memory.dmp

                              Filesize

                              116KB

                            • memory/1484-122-0x00007FF92A0D0000-0x00007FF92A2DB000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/1484-119-0x00007FF92A930000-0x00007FF92A941000-memory.dmp

                              Filesize

                              68KB

                            • memory/1484-112-0x00007FF745420000-0x00007FF745518000-memory.dmp

                              Filesize

                              992KB

                            • memory/1484-117-0x00007FF92EA70000-0x00007FF92EA81000-memory.dmp

                              Filesize

                              68KB

                            • memory/1484-116-0x00007FF9342A0000-0x00007FF9342B7000-memory.dmp

                              Filesize

                              92KB

                            • memory/1484-115-0x00007FF93B360000-0x00007FF93B378000-memory.dmp

                              Filesize

                              96KB

                            • memory/1484-113-0x00007FF92A950000-0x00007FF92A984000-memory.dmp

                              Filesize

                              208KB

                            • memory/1484-128-0x00007FF928F40000-0x00007FF928F51000-memory.dmp

                              Filesize

                              68KB

                            • memory/1484-130-0x0000022882140000-0x0000022882346000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/1484-127-0x00007FF928F60000-0x00007FF928F71000-memory.dmp

                              Filesize

                              68KB

                            • memory/1484-126-0x00007FF928F80000-0x00007FF928F98000-memory.dmp

                              Filesize

                              96KB

                            • memory/1484-125-0x00007FF928FA0000-0x00007FF928FC1000-memory.dmp

                              Filesize

                              132KB

                            • memory/1484-124-0x00007FF928FD0000-0x00007FF929011000-memory.dmp

                              Filesize

                              260KB

                            • memory/1484-123-0x00007FF929020000-0x00007FF92A0D0000-memory.dmp

                              Filesize

                              16.7MB

                            • memory/1484-139-0x00007FF92A950000-0x00007FF92A984000-memory.dmp

                              Filesize

                              208KB

                            • memory/1484-140-0x00007FF92A320000-0x00007FF92A5D6000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/1484-138-0x00007FF745420000-0x00007FF745518000-memory.dmp

                              Filesize

                              992KB

                            • memory/1484-141-0x00007FF929020000-0x00007FF92A0D0000-memory.dmp

                              Filesize

                              16.7MB