Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 16:34

General

  • Target

    104754d6373b209ab66fed26047f8f41351220399f7a2aa45338f12b53f30f73.exe

  • Size

    897KB

  • MD5

    783f68bcdcd9f6e41263fe7f73c7e57b

  • SHA1

    672b1a9f0d956c916a7d1ae534014f500b8fcc24

  • SHA256

    104754d6373b209ab66fed26047f8f41351220399f7a2aa45338f12b53f30f73

  • SHA512

    22320e76498a996fe1861f75e6b9d7ffb1ef014c38f44d4d317ceda8f3029ce3881fc7096b4cf307f18f3ef9b16576af93bb25714045394c917f654b5edf0aa0

  • SSDEEP

    12288:YqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaETm:YqDEvCTbMWu7rQYlBQcBiT6rprG8akm

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\104754d6373b209ab66fed26047f8f41351220399f7a2aa45338f12b53f30f73.exe
    "C:\Users\Admin\AppData\Local\Temp\104754d6373b209ab66fed26047f8f41351220399f7a2aa45338f12b53f30f73.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /IM chrome.exe /T
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3312
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
      2⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa0adbcc40,0x7ffa0adbcc4c,0x7ffa0adbcc58
        3⤵
          PID:244
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,3374893746768797493,17015748211624027314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1928 /prefetch:2
          3⤵
            PID:1148
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,3374893746768797493,17015748211624027314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2184 /prefetch:3
            3⤵
              PID:3704
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,3374893746768797493,17015748211624027314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2408 /prefetch:8
              3⤵
                PID:1428
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,3374893746768797493,17015748211624027314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:1
                3⤵
                  PID:3680
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,3374893746768797493,17015748211624027314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:1
                  3⤵
                    PID:1156
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4628,i,3374893746768797493,17015748211624027314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4648 /prefetch:8
                    3⤵
                      PID:2620
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4684,i,3374893746768797493,17015748211624027314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4696 /prefetch:8
                      3⤵
                        PID:3812
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4800,i,3374893746768797493,17015748211624027314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4788 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1928
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:4992
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:3124

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                        Filesize

                        649B

                        MD5

                        7d6f2aa400707f1509e1a7deb19e7afa

                        SHA1

                        2bf8f01da6ac9acb1c7c0fec711c4d249e029c2a

                        SHA256

                        d8194e5338b32da9d830439c33ec3cc1a97cc21fe6ac8e53d08272132280abd0

                        SHA512

                        49e7a59bb59ea6156ac7aed0e0ba37a62456765d4334cfb95433420e28e5ae295dc7304a9d76b1e8a4875af8500a84de98caa00d58d9249fbeee45831f729389

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        288B

                        MD5

                        a785f0633deb099ac44aa5dfc527bbb4

                        SHA1

                        335c902d67c897f4d46022b4043e7734d4cb0c07

                        SHA256

                        0aef0ad3922a2fafa5d02ffbc0f4100491e023d6d0bc3f0c05af3b1646466fe4

                        SHA512

                        808eee0ee111bfa0107d83acb0893112c58582f2769bf1690570d6668c5b112ff5831c4d96b800d7f035aa219a1aac408a51c8d3207ea32eceb5e7b9650739cd

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        4KB

                        MD5

                        3c09364f72b0b2b1babf4c89354ce9d6

                        SHA1

                        580e68e6769137552854b064f9e6026b5b12bb9e

                        SHA256

                        2b28766e37778989f1ceedbb4058eae383b967ff0333eb288a50819ec939718c

                        SHA512

                        7730e58972e3ed527f9d55433e62ebcbe3a9ff7761bf9888a49febff90e1b0798f6772d845efecdb2c047b7e86dadde00226393aac082726d4594fa29b823d82

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        859B

                        MD5

                        8768277540c857529ae3a0bc87267852

                        SHA1

                        b04f42b9e687cf96229763b6f2cca9d2ac459756

                        SHA256

                        875add75e5e33162ba7a592c368ffc993bf1d916da2452262d7b8b75b7ebf9d4

                        SHA512

                        4b02703167d3270b8d0243c2b8319d22e3e37404d13357e4d21d02fc0defd7510eb56a94d88a08ef95210b2896ca7bc73707c3de94320be91ae6a802fb1af7f3

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        feb060f3eebc2ddc325ac86324e8d07d

                        SHA1

                        b981317702b9133adeda68d741093d70f6ed186d

                        SHA256

                        bba8adbbaa33bb1c3eec3154e857d5b27b2f01f494c2546367f2e65e8705ed3f

                        SHA512

                        71ef59c82a5bfef9b97f83161c6daf1acda6ca99ee215bb1e537059a088c0ec19335aa44825231b4e4386f20139992935817606b8fcba8fdc4218ec6b69b16e6

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        a977afe2eb0e5b41bcbd9b9fcc99e96a

                        SHA1

                        678a9619b99e992f4ad061a61b93b5c04cf2bc28

                        SHA256

                        648c22be42a8b638a324dd55841c37afb61010cf56a788ea1f7c8d3a258d5829

                        SHA512

                        29005d6ccc09458494a550253cb958f0a5ccd25bd7cea586e0fa58173c0f3792bf94d79d68a8311707aac92252e55ab6f19cef94e50fd3bcce631a6f08926513

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        9b39013d6aa51f9f546efeb22f4127c6

                        SHA1

                        ddc7a37a2650dea7199e727d02615fc50acdc191

                        SHA256

                        3837ab1e5d90a7885855819c2961633fa815503c02d35cf0ebbd297b076735d9

                        SHA512

                        5260858f8b8892dd642ecdf47f2a4e6c9d6203ceb75fba475d43370c7b1a94926f021a6410e3e151415fdd8fb41f8cf966d211ed8a528a7aba15099b7614a2fb

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        092341193da80f860f9c325753b4b99c

                        SHA1

                        be47f890bae2ac07787debb2e6d31c216ba7e31f

                        SHA256

                        a218a0e74de8b21dfef89c967354f1af7ce07257a72b3c566ad20e4189d4928a

                        SHA512

                        a670e29b13bec4ef656314afc0385a59e94cd169e80a503262d9066b3947e3aad10533aa0f1c0d82d2e00a5d29899d282f433516926abea3428cdbb9c73d5055

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        9KB

                        MD5

                        8148ac8c08b371e46d96b386c362494d

                        SHA1

                        462e9f974a9e8e439f4c84953ef595a06ccc29e1

                        SHA256

                        f9fa614654c3e1195cb607e1448be4e31fd51db343069ba7c66669505edc31f4

                        SHA512

                        9934cc4c7e47c928738736cb23ed86381a7c5982bfae41c3355d33f545db647ec790e38e426197ff84788579b93fa4ff506abbfb97f507920b8018cfb1d10b9a

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                        Filesize

                        15KB

                        MD5

                        016d1830a8cd5516f9df09fb935dd5cf

                        SHA1

                        364702969f64f826e2bd603016bd1f5615be8358

                        SHA256

                        2313fb4114f726cbae35d598f37f2bf8fc39062b2aefbb77e5d1c109d12c9444

                        SHA512

                        4f0951c059dec6ec8358ce8d05379893afe99a26e0602a0683f2a616c5c7a7e4617941ebd0f4b54c2dce57c67e1b1eb2f17d79134ac04288bd7159d0a4e28505

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        228KB

                        MD5

                        21e60d21f70515edf2e66817b30139c6

                        SHA1

                        f49caddb189bedb9fe6a01b5a0a6c1d499b5e9a9

                        SHA256

                        199320e893f85aec71c9074fa45c9e8a81da916ee3f419f327f33d60a1e0d0a8

                        SHA512

                        5dac14441ba58b00bbc74501e5ecf23d76cefbc920036eb840a467a720a701a1a017cf7c818b3cf98d29ea8d56e7262ef286ccbc69a45fe9dc7632218347526e

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        227KB

                        MD5

                        41c09d35e1fe77bf284764c239f554f1

                        SHA1

                        2d7bfa36b9845f8029315c70ff2ddf3b06aad5b5

                        SHA256

                        12494616c5963527e8827156c02ee63891cd73f4d4b75a2bc059e13318587074

                        SHA512

                        f94f6d9cdab9986342c99dfd0af367995e2ec95a541ae8e357a7613ef8be04e7226189ac90e263bbc4df13c2cfcfbd55a37a580f02f9a47c12def0e81882782c