Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/11/2024, 01:34

General

  • Target

    https://drive.google.com/uc?id=1hh-c4hz70H0MM7_BSwXdvuUhGtFisyyr&export=download&authuser=0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?id=1hh-c4hz70H0MM7_BSwXdvuUhGtFisyyr&export=download&authuser=0
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:444
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff96a23cc40,0x7ff96a23cc4c,0x7ff96a23cc58
      2⤵
        PID:4748
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,4274221886628899752,8534251985333726794,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1940 /prefetch:2
        2⤵
          PID:3084
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,4274221886628899752,8534251985333726794,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:3
          2⤵
            PID:1204
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,4274221886628899752,8534251985333726794,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2268 /prefetch:8
            2⤵
              PID:984
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,4274221886628899752,8534251985333726794,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:1
              2⤵
                PID:2460
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,4274221886628899752,8534251985333726794,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3388 /prefetch:1
                2⤵
                  PID:596
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4572,i,4274221886628899752,8534251985333726794,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4584 /prefetch:8
                  2⤵
                    PID:1604
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4420,i,4274221886628899752,8534251985333726794,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4868 /prefetch:8
                    2⤵
                      PID:4424
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5184,i,4274221886628899752,8534251985333726794,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4768
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:3596
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:4156
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:1560
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:4696
                        • C:\Program Files\7-Zip\7zFM.exe
                          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\RELACIÓN DE SALDOS - CUENTA DE COBRO.pdf.rar"
                          1⤵
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of FindShellTrayWindow
                          PID:3316
                        • C:\Users\Admin\Downloads\New folder\RELACIÓN DE SALDOS - CUENTA DE COBRO.pdf.exe
                          "C:\Users\Admin\Downloads\New folder\RELACIÓN DE SALDOS - CUENTA DE COBRO.pdf.exe"
                          1⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:3476

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                          Filesize

                          649B

                          MD5

                          75a33d476dcccf86b083d954a4dc89a2

                          SHA1

                          2c4f73bb127b86b5893fe20628b2fd2aee039d5a

                          SHA256

                          bef56a64ec304fd50e69af0699a60fbe065f6d154d920737f45ee8243ee7d1c1

                          SHA512

                          0b1f86ad7d425d5badabc11681dfea2cbfdf97b4934f5ea220244c2611cb32e48f9c31ffa8885724d48cbf593642484b03a67d402899b5fbf2851d18bf3049ca

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          1a6fafa922349121f410571861c044b7

                          SHA1

                          f42e4b71d2de140c9d6acbe4e2e394c94005e7ff

                          SHA256

                          6e09ccf5169a493dddacecdad2bccab4664db8bbd871250e1e95265147ad3a9f

                          SHA512

                          8113d0fc591f59c3d5eb2134424583d48cbbde61c18aa3596b5604ca07162183da4fd276fee87635ee18451043a70c1e86c9a267865e890eef6ea9c9ee16a178

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          d23a407ca72fd16d6bf5c1bf7c221005

                          SHA1

                          ddfdd5192a253afc2812adea3d43e2864b3b0d16

                          SHA256

                          3783dd586b1e8df7cfb926c8c2656d4e93e03aabfbb81d1e67fde076a7ec4dea

                          SHA512

                          3e487e6cb762bc9ad9ff146ef15aed57c7772c4b2c6768cb84f4e463306778a6aa24f816865ccac7667195492d52497926a57ce665f5bf6cfd713b862844276f

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          524B

                          MD5

                          b6276bad35c2d24f2b293e994c68102a

                          SHA1

                          86f67a9d21054e23e697f28eeab1541e1ea5d16f

                          SHA256

                          81114b2d0419458c805d8639b36eaa0e865af9451b9d57d47367465e10700ec3

                          SHA512

                          aa72f8f59133523cb6caac80fff17e89db06e99b4329949c1366f0ea55f1b6d8b1f628472e38297225fa1d2fa766f7293a7e6b0bb5485fe204870eacdf296e56

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          60311c09687f5974b2d6923d900d658e

                          SHA1

                          1f842368888e084f8b0ce47b4c83be917dfcc824

                          SHA256

                          4df7f73ee6fc8ca8e5ed622f3a4e6a9b0f4c2928d900745854d4494ae5386b0c

                          SHA512

                          3534000cb1b19dc061f10b69868128393c03ace404e216af8c88809359cfcad6c3811c15dadbcba309a948500eabb8badb3953be43435919b0c4ebd00a1afa56

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          81c95851837579610d2b14dccc5e8d0a

                          SHA1

                          b8fa677d0b42fa2d906d889e32d45622244d151e

                          SHA256

                          1d6e7b634bfe5e55c2a458b95e70364322d771fc9e98616923492080794bee00

                          SHA512

                          6c7538453794a28dde71e6102b0cbbcdce2eb4d857f6e2f1e34d7340e128397c1da63d715ad695aaf536847cbaddf0c663b726f73a73a17370b3d34e53334e25

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          2062cdbc476634dec03ba7732f169ac7

                          SHA1

                          1404550c7ba9391ee1660008187274643146ca70

                          SHA256

                          520791db3805d578326362c8ffea38bf8f2145d97cc96e66de5ceb0e15262687

                          SHA512

                          fe8d3c0a2b0b58e7797d7228d3001f739a0eb264f4acd8f65c17d7984ae980c85a922fa101999f85ebe484b7b11d130bdbb33f7a59166c11764dae72a18b5bc3

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          93c4067ddd295ec7a1c2e0189595b0b7

                          SHA1

                          48e8a1fc9b11e5a456c44a6b795e25de6a4ba80b

                          SHA256

                          a30068f0b6299fe8d7ec501ad3104baa85335e3856f58d38af27c0c25c2a7b4e

                          SHA512

                          28b88f6846f91770297bcd3bd1ba431ed24f4af25d01766b9060a91f55ba3f720fb3679f0e7893637686a8fe67a5c91a58abd6d455c4a3cc75b0aca3b5c087d9

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          17809cd4e8e045d0f491bde462a71ba6

                          SHA1

                          b316a160b9ce28cb530c5659950195ae252b646b

                          SHA256

                          ee6aae8833472149ec2e16c3f65b689f98dec860d2930861da5ca03e2b60a9fe

                          SHA512

                          c4acf4eae08be1bb36e5f06f1ee99915037dfae307b17280c5134f11c9974b27095620a40ba1928ae9dba44028bd7b2653884df644b6865581d6e4bde8627e46

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          6e8afd55c595af6ecf1a068035c9b704

                          SHA1

                          477126469e5eaf5a3f333d01b98cc635d131b802

                          SHA256

                          fdcc972e50863ab45d9c5f02445f80a38afbf59bc53d508c908352fff9ef872e

                          SHA512

                          13f000c4e2cae36df4862e4ea087f5c3e48df3d8e86938c5280625f3b2fc668854c1bf303acdae597f4f290698409964613b4e6ce8fcd5d2d5f2696b386dccff

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          2cb86cb2f320b16891338e57dd21a523

                          SHA1

                          0c5dd4cac40f6abe76674d8d1e6b0a03e105d5e7

                          SHA256

                          a666b28a5fe30b7ab89b5a266340e895612eb3f7be12b4e9bc501d96c1e1245c

                          SHA512

                          423946764090c5f0b10358782adcdb01a4c998a01761150aa4dac48cbb7290ac817e667ab78c99f91c3f5c80cc457aa57863f2c490bf9d26b093cef2660611b3

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          c1f728874b5192a0c8ca7918b5fd80a7

                          SHA1

                          da3be310a6c945ba73fae106d544bde78ac45de5

                          SHA256

                          e6037e1779616866812254cc31d2891f7057448da5c2a851576cdaebab6ff87e

                          SHA512

                          55840cd2df83996e2da73823a8c050b7c8e56ce0ac28f852773e49c073aae80061c4270778aff11927404e8bebd8e837a82529bb3f77e68324715f5d8bd7d9d5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\bb92a841-52a3-4ee9-9d30-ba0e2a0c8246.tmp

                          Filesize

                          9KB

                          MD5

                          fc5fe496b1217047d1fb90d7f87b6e70

                          SHA1

                          8917b25138670c57290dc192b41c1a5df94d802f

                          SHA256

                          46ac2eb2d1cf60663b47921037f23a15ae49faae413aef45fba264575bf530eb

                          SHA512

                          0e9f4ebdaafd6dc17ba73b90e7be00d63469c1687b26aa32381cbcb5383ea78107883848911a0f3f4e5b71f8cef744e8898b437bf32b73566aea20df2be7c260

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e4dada07-b1a6-44fd-a95c-6696e19dd641.tmp

                          Filesize

                          9KB

                          MD5

                          c29f4b160a8414161dc3883708456b8a

                          SHA1

                          adb9a13cbca1b63ff524482696a933daff8498f5

                          SHA256

                          a734a163f54113a1d3d40da3bd4c544f226d8be57811cf93868ad28c0941a375

                          SHA512

                          df9aaf8692870e575eaf14433d510865deefa279a95d3d797b283f5b9b8cd25528aa0a690887d3b57d6e4a250af931378da5ac04b1c7d8c35161a3759cd3aeb7

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          116KB

                          MD5

                          a49bd928b404dc141d73aa966119ae33

                          SHA1

                          40eb94505b501bc75b6318addde293cd57858286

                          SHA256

                          08108895f3a78fb526f38a80f6e47a61072e33296a05d4b286b174c7fcc9124a

                          SHA512

                          869cc974190ddfcb5adecc38fc8f00c677dace8daa4589be3a0fada15d88e330e930fbab32a144c019e35fd2771529d6262c9d04822138cfe850b02981259e31

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          116KB

                          MD5

                          7abc16e7fa062468b9158cc8b158b862

                          SHA1

                          1bbd2aeabc3ea35fe979f0a4311f8e80557006db

                          SHA256

                          c9d8c8308909ca73655a8f11f5731c1325f75d6e6ddfdcc4676ca19558a5bfed

                          SHA512

                          a054de72d557224b66f06ab9a687a4180df65844405cf9e635265120d987c530ad2de1eb5d9b832bbc94b343476c4ba0b6b13b4aa0bc98c295f1fdc61d0e1b7f

                        • C:\Users\Admin\Downloads\New folder\RELACIÓN DE SALDOS - CUENTA DE COBRO.pdf.exe

                          Filesize

                          17KB

                          MD5

                          d53785d8ab90764ef242799778680e56

                          SHA1

                          913e007324e52c2204dea1e394775179ce3cb65c

                          SHA256

                          dab0bd1ea3ac719998f36204fa0ff645f542dd2da103fd1c8e32856609462517

                          SHA512

                          95b63d5827e52a60ef382f2b2d46f143dfe97265371e4cc54606feb459d9ae3a23898685d9d58411fe9d1fb70e2ad355300f1a403608361d4e5b47afe33e774d

                        • C:\Users\Admin\Downloads\RELACIÓN DE SALDOS - CUENTA DE COBRO.pdf.rar

                          Filesize

                          8KB

                          MD5

                          7737fc7ef5c01597f644eb9d17be5000

                          SHA1

                          01de41831188437b2ee8b62bac9ca5feaa4fabd4

                          SHA256

                          68706d70e63458e5d88fd599c77d1ad8ed9a38d62b1d159eb4415fb143c63f28

                          SHA512

                          e7f0220e24a5d9e7bb9b02968e2521df9d8f4bdeca368dad2b44faf412eb1ccbcdc92d4c6fb60960c4e06b57e16be8313041a0c708e3c2b92c10065b839d09a4

                        • memory/3476-117-0x0000000000FC0000-0x0000000000FCA000-memory.dmp

                          Filesize

                          40KB

                        • memory/3476-118-0x0000000006C00000-0x0000000006C1B000-memory.dmp

                          Filesize

                          108KB

                        • memory/3476-119-0x0000000006D40000-0x0000000006D5A000-memory.dmp

                          Filesize

                          104KB