Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
04/10/2024, 22:05
241004-1zxpzsyemk 604/10/2024, 17:48
241004-wdxqmsxemn 804/10/2024, 17:12
241004-vq4jaazgmb 804/10/2024, 16:01
241004-tggsgsxekf 604/10/2024, 15:22
241004-srv77a1fpm 8Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04/10/2024, 17:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://malshare.com/sample.php?action=detail&hash=e8c4231db55021ca09e9e80c0e5376d92e6f61fde673ef428d9b5b7d7fb48553
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
https://malshare.com/sample.php?action=detail&hash=e8c4231db55021ca09e9e80c0e5376d92e6f61fde673ef428d9b5b7d7fb48553
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://malshare.com/sample.php?action=detail&hash=e8c4231db55021ca09e9e80c0e5376d92e6f61fde673ef428d9b5b7d7fb48553
Resource
win10v2004-20240802-en
General
-
Target
https://malshare.com/sample.php?action=detail&hash=e8c4231db55021ca09e9e80c0e5376d92e6f61fde673ef428d9b5b7d7fb48553
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133725357045345854" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2260 1640 chrome.exe 74 PID 1640 wrote to memory of 2260 1640 chrome.exe 74 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4420 1640 chrome.exe 76 PID 1640 wrote to memory of 4120 1640 chrome.exe 77 PID 1640 wrote to memory of 4120 1640 chrome.exe 77 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78 PID 1640 wrote to memory of 4892 1640 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://malshare.com/sample.php?action=detail&hash=e8c4231db55021ca09e9e80c0e5376d92e6f61fde673ef428d9b5b7d7fb485531⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xcc,0xdc,0x7ffde1649758,0x7ffde1649768,0x7ffde16497782⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1508 --field-trial-handle=1796,i,15670258555584299690,5707680481687316100,131072 /prefetch:22⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1796,i,15670258555584299690,5707680481687316100,131072 /prefetch:82⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2040 --field-trial-handle=1796,i,15670258555584299690,5707680481687316100,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2816 --field-trial-handle=1796,i,15670258555584299690,5707680481687316100,131072 /prefetch:12⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2824 --field-trial-handle=1796,i,15670258555584299690,5707680481687316100,131072 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4340 --field-trial-handle=1796,i,15670258555584299690,5707680481687316100,131072 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4528 --field-trial-handle=1796,i,15670258555584299690,5707680481687316100,131072 /prefetch:12⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1796,i,15670258555584299690,5707680481687316100,131072 /prefetch:82⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1796,i,15670258555584299690,5707680481687316100,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3824 --field-trial-handle=1796,i,15670258555584299690,5707680481687316100,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
Filesize
264B
MD55332501c3809c37c326451b9d4c4e6cd
SHA1c016ce5fcc3de0131d6ac652d5ef9eb96d86e20e
SHA256af5c0deb994c27a0e4e3cadabb70c09182b31e5b656fabc5f79696967e2290e3
SHA512cb8b82286cdef3abbdd6fbe565fb7ce41eedef93971b3ce4ded69e564c4c9c7b03232d3ba804d27d4be3a66920743a15b2ac509d2cd909f484334b80854217a2
-
Filesize
1KB
MD599593ece7b5d2d31cb42f8da123cb1d3
SHA1ab7a56b832148b0b8e5db03773dc56a966802958
SHA25676b5baebc1cbe2ea890532ac4dc006e650c6ff820cbff048d594c585007cf7b2
SHA512ccbcf97961d4eeda00a96f479149749c5868d26f855945c94d58a0373bf0ad6480728aa87405d568766d9878b2cac768704435f29b4e3efa77388ebb28dbe8dd
-
Filesize
706B
MD5d3c8451a5afe604e1c005e575285b0c1
SHA16628a095a6909fb8320b6e8be1c5501f1d597fd2
SHA25640849315ccc62cf807ca1f7b08dcab2e1ede07c23679e3506a5249811a7e3d52
SHA5125ffc94903d3775e9fa15ea4f0a8a6cf7da3cda74fdef5c4a8695eb86eba8ca8e520b6ac2e23146fac9e90c5918eabb5a5216d39d728dec19bdc28b7d7a5d496f
-
Filesize
6KB
MD51fdc5cd89cc602fad268c2d2ea16d4bc
SHA17d05567e739bfdfbb85103c74bb89731a66a9d83
SHA256a1a3999f4c9c60a34d5f870bad33d0892f5e30e3eddffc77679954683d20f6ad
SHA5127d55b5b30f8f61d5618e741f0827873abdd0e731a5368da7fb2a93ae32396aae1149029e5a0358abff92f1b01e20d454676fdf75ffe9f2e7d7f736209c516a1b
-
Filesize
6KB
MD50df36c76f45507469c68fa173d5c36f4
SHA1a0ecd1c86207cb7519f23214b1b7a96f31315c61
SHA2562c47b35c450a5af7595833d6cb3f32d966b0ef1c7b6d0bfd89638e27640a4d12
SHA512242a0ec94d263c91f808ba6f825435e64005b069d2efaa71a4d80143edde09d1c5e48c73b559d4fd8a4aad0c8a1bb485a6ba37ee2a52665f9d853347b9cd8074
-
Filesize
6KB
MD5aee18f7e2190349171bfac2f9719d5cb
SHA1ddce1a5a7b4820254c0eefc28112b695850a6b31
SHA25639db33b785b500a6b96f23cc42fab8d1c3aadd12ff7f4603588b1beb7caa9d43
SHA512a70f6ff9a76479dccf5c16a2d6b58b129d1cd9639b81b9ccc13298432ed4e021c1c3be3c15e2b880098161616fde6931c416f53183bf9ec461ca8bc5d8d33253
-
Filesize
136KB
MD587f884374d77b0a888cf7ce2d7aa36eb
SHA1acb7ac3dac332c22234a1cbb44aea04cf7dbb005
SHA25674249a8a63d8714602d6395f0274bf2e55c8ba9621fb827d5be5b297c50af2c8
SHA512f5ff16305268bcb08642aa4bb688ed92679398d268ed89828dfe275b92293e016ad4d642d0e1fba0db3a03db6497105548834a980d6e39632fbf6d5d31ad7131
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd