Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 16:05

General

  • Target

    file.exe

  • Size

    897KB

  • MD5

    2cc74a77759fbace03e360001f688b36

  • SHA1

    cf76ca9d046afbb55adad78688ebd48ba5496b7c

  • SHA256

    c0f98f4a17362be41289e2287399b0347d35767c4ac5089680095d9dd28961ab

  • SHA512

    9a7ba3934a6fffcfe1135cee00f8b963576f5c7afc7f5fabdffbdd98c6437f08fa75923b1550df2027aa85fbc5d85fed6ae1aeaccd1ee7ee0936b454cc3a858b

  • SSDEEP

    24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8a4oK:lTvC/MTQYxsWR7a4

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM chrome.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3076
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM msedge.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3500
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM firefox.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1088
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM opera.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2756
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM brave.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:928
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8b181cc40,0x7ff8b181cc4c,0x7ff8b181cc58
        3⤵
          PID:2432
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,18073739897731992742,14090061139749487886,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1844 /prefetch:2
          3⤵
            PID:4472
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,18073739897731992742,14090061139749487886,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2156 /prefetch:3
            3⤵
              PID:3584
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,18073739897731992742,14090061139749487886,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2408 /prefetch:8
              3⤵
                PID:3148
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,18073739897731992742,14090061139749487886,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3164 /prefetch:1
                3⤵
                  PID:4692
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,18073739897731992742,14090061139749487886,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3180 /prefetch:1
                  3⤵
                    PID:3980
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4644,i,18073739897731992742,14090061139749487886,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4492 /prefetch:8
                    3⤵
                      PID:4500
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4660,i,18073739897731992742,14090061139749487886,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4716 /prefetch:8
                      3⤵
                        PID:804
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4664,i,18073739897731992742,14090061139749487886,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4844 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2984
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:3476
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:1172

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                        Filesize

                        649B

                        MD5

                        500ad1460f32582b0094743b961d77bc

                        SHA1

                        e7b279120684856041f70e389736a0e26dbee160

                        SHA256

                        cac48e96c38d5a91225182bcaef9c37900e2b37e31476fc5effb7a62da42944a

                        SHA512

                        45735d65ba1de1d0e8cb1cf7c741ebdaff2b66b72050deecf7590fb662d5af4e3eed0a51c5b4bf72eda9d20e68836dbbb3cd04995b7f8d751b960352406b77b5

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        264B

                        MD5

                        8e76901067cf6e12e7da66516dbb0208

                        SHA1

                        64c21897c85ad53d9de0e75e317f50cfe8dac3c3

                        SHA256

                        60312db5578ead7eaf102c85653632f5a54a285aa7d03b8d587533d4f0ddf9bf

                        SHA512

                        2ca91576cdee312d0350f3aa8ba0ca49249cf0df278349e8d9b146e84c2ba20e169fa026ba4d500cdb022f097b9b8bd40cd3699fd3b22ab389b6a3933a58037b

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        3KB

                        MD5

                        299976f3de500cc647ff3601c4535934

                        SHA1

                        bf2b910aa90c496471641f86f9f7cb9ece6304c1

                        SHA256

                        465e38ba6461f88618858f8750e55b4e14b8788639c4fe918df3708d02bf120d

                        SHA512

                        3d6a2e857d22cfd2d95b6ccd05f2054c44796168733f0c62c5bfcf7e20c03e8d8af91440ccce2f8d3cffd3d59595e5c11e1f1aa6df4a983041f1cd74fdff3a0c

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        2KB

                        MD5

                        b1aad288f5f286ced3c21361da34962b

                        SHA1

                        48f6990479fb3553013be5c6143122a7f77a3e28

                        SHA256

                        7ac933ad076740c04424bf81ecae1a5368c07081177e3be896259692309f6bf4

                        SHA512

                        2a0b21a028e473dc1240715c6abd3b449203cc6c29abe3a6b82fec254888f394bbaffe2ad2ec4e6e8f74fdfa6329048b1cd3181e8c2e85d4269c3f36ba407a69

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        859B

                        MD5

                        58fccf7ae8ad40dec20e06ab6a822419

                        SHA1

                        9610653cc21ddcab7a2019a0e88f732435201f75

                        SHA256

                        8c8a939baf7f9ff415da5f69b8ee632aea6a649ca061b08c8d374ea7d3248899

                        SHA512

                        80ddf0568954c80daa70c38eaa5f042846db01eb1ab26f72c21f899b551f34fcfac92fa7a66dc6c9d4914b81851de4bf4f8dc743af96478a3dd78ac38973ef8b

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        f336755e95ed764c9c66d3bb6dad98c3

                        SHA1

                        e17496f436f229235fc448b3d6b2a67e1e2d2cc9

                        SHA256

                        9425e88764eb486acb51f6660d6d4771fd489b7bf88aa8e045eca10fef9b69c0

                        SHA512

                        c34615a2ea380899b97c8f41785a537e5f6bb03d71dfb3be99c46fb169c74bfdc2477dba055a8c68de7e087f262571daf7cf732193f47b4018d2f86790eec5f9

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        f99663cfa743e9070812702e265fc98e

                        SHA1

                        36b4f6f271aa2e186f01ec87d00dde69a0b62c91

                        SHA256

                        3501d6172026e7dc1a1d015fe3e7a5a6e373309bbe42e97eb33c8cd39ce0c3a5

                        SHA512

                        2cd8200d01f2d3189b92eb4bfb2b897a9e56e8b4d17eadb936190af2dae4f4dd8d219f15e72eae167408247d1512919b697b88a76296d6a08fbcc1c37d385fe5

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        fd6a2d294553f1493ed6fa3282ca7b5b

                        SHA1

                        9f69230e3fad31cd3be425ce0c5d961189bc74ea

                        SHA256

                        63ef969fbf705d44aa430e37917c4cca0d0991ea32e37e115e53716dea2713b0

                        SHA512

                        b83ef961afb7e6797d8ba8fb68bbc283912ef7b94fde07e3633bb3f5ca7fe877a7d84aa728793eb0244ed67d1adf4af7bd8262ad57ed2450a0f3e6dc7485d0b4

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        1481dd77776dc190af60533c1157f596

                        SHA1

                        9e908c94be6ac3584f8591ad629f48852c485899

                        SHA256

                        5275e9ce2450a6b26b83e6b7fb4adb3785cf73157a90601af934cf57eaf004b0

                        SHA512

                        d970487d862750ca397eadc95c1948ca3f39e70b96acd505c2629a0a8eddff9b511ba3e1a1327528c8fc7c78c28710013067b6ace7df29c55c8de687bc9ddfd4

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        10KB

                        MD5

                        3c4040e7c7cdae6f5f8d4e8d60426358

                        SHA1

                        218b7f3fbc9ba893e07a1d97d098561d1d2dd0e3

                        SHA256

                        f578f904c3237661aed5b24b0ff7114daa98e84c86d86c0060925430cab6df1e

                        SHA512

                        7a2d47f9a8359ff9c669618a911cf3b50c7836f9dbd3333992a26c3d4f44ce9d51cbeeca561b902986b8f392164d8d80cb3f135efff230f2d0f569855e881c59

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        15KB

                        MD5

                        b6dc0c41d464ba95ab3501932ee5de0c

                        SHA1

                        49a0b858a61cbbe857538789b572440233a6f23b

                        SHA256

                        91cba68b38425fc290be39aa4ce6aaa0779ee4ddede2d952a66441a0b90762de

                        SHA512

                        04765d1b7352449f17952fe5d00a90553253a1c85092a46dab856ef771b16954ffda48cada11e9f2ba2da55496d7fa6caa9e30cb9d027becefa64796b6bda479

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        211KB

                        MD5

                        bb23cfab9a3dea0e091ca62c1a765f4b

                        SHA1

                        1119193cfc64468523b1b8185ca3c35df39cabf3

                        SHA256

                        df22c331bce73d888cbd73d70d829361ec7dcf5bd9ecbab895b667413ec1f8f0

                        SHA512

                        7ddb6a62c2a3aae27d65dfe0e50a94bc7042ab92e3a590779af5a8aa2525ac92185787755bb1739ab379f7a7f62323d67c3aaf9fb184ceedee77c5f61cb614cd

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        211KB

                        MD5

                        67871dbe41fcf4c74cb8c83d01fc3062

                        SHA1

                        aca07ac47fd38dcde58390ab54ce1cf40f612cb0

                        SHA256

                        4887f28bf17bc5e856e4c07db26ca7c0db0fdc0d2c25c8e7bf736aa0eb880b09

                        SHA512

                        ded8456bf70be70deb1472711f778eec8187f3f43d83b4cd2f37691aa61a3add6e76b851bf6f4d55b9b55b5f9fcf40b619ce31bf28e454de9f036ec8c9952b55