Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
9s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2025, 13:14
Behavioral task
behavioral1
Sample
ChromeUpdate.exe
Resource
win7-20241023-en
Errors
General
-
Target
ChromeUpdate.exe
-
Size
119KB
-
MD5
eedc846c4cf322bbcf849a4af793ced5
-
SHA1
77fa1a6feb62bd77d30be181696802e13524da8d
-
SHA256
b3ccfc4ddc7f6abf0fa7606be8495acd20c23f85ab23c2fa8bfe43e84befa126
-
SHA512
6eb5963fa6d4cca6a2de25850cf47064d8ba523223a55048600fce8cadd120487507af50b0fd39c14b20bed3b976bb9510b5699efc7533e540350101c087ba2c
-
SSDEEP
3072:Y/aazycnfYOgWPyZ9dOpbZqHVQWqzCrAZuuQD:HIsWqndOpb4K
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7742822790:AAHkizf3bilCkIqp8NNVcbWObKSVKo8Xifo/sendMessage?chat_id=7053620590
Signatures
-
Toxiceye family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ChromeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 1 IoCs
pid Process 2352 Update.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4244 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2416 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4712 schtasks.exe 4924 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2352 Update.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2352 Update.exe 2352 Update.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2928 ChromeUpdate.exe Token: SeDebugPrivilege 4244 tasklist.exe Token: SeDebugPrivilege 2352 Update.exe Token: SeDebugPrivilege 2352 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2352 Update.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2928 wrote to memory of 4712 2928 ChromeUpdate.exe 85 PID 2928 wrote to memory of 4712 2928 ChromeUpdate.exe 85 PID 2928 wrote to memory of 1628 2928 ChromeUpdate.exe 87 PID 2928 wrote to memory of 1628 2928 ChromeUpdate.exe 87 PID 1628 wrote to memory of 4244 1628 cmd.exe 90 PID 1628 wrote to memory of 4244 1628 cmd.exe 90 PID 1628 wrote to memory of 1900 1628 cmd.exe 91 PID 1628 wrote to memory of 1900 1628 cmd.exe 91 PID 1628 wrote to memory of 2416 1628 cmd.exe 92 PID 1628 wrote to memory of 2416 1628 cmd.exe 92 PID 1628 wrote to memory of 2352 1628 cmd.exe 93 PID 1628 wrote to memory of 2352 1628 cmd.exe 93 PID 2352 wrote to memory of 4924 2352 Update.exe 95 PID 2352 wrote to memory of 4924 2352 Update.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChromeUpdate.exe"C:\Users\Admin\AppData\Local\Temp\ChromeUpdate.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Update\Update.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4712
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpA950.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpA950.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2928"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:1900
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2416
-
-
C:\Users\Update\Update.exe"Update.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Update\Update.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5f4d08beeeeddc3bbddfa2466586b9f1f
SHA128d513c657eea39a6ef2de336325535f4422fdc1
SHA2568e80009d84e107abd02a26a46b25ffd0589075d665185c1f117463855f9625bb
SHA5126be8f25a6aaa81c67fa2d8bb5199564b045fd224346e1d0ff836c355cc14d657406d0faf212153a6dbed981d89be079e8567ca1026cb0ea8a8ec106cfc0a03b5
-
Filesize
119KB
MD5eedc846c4cf322bbcf849a4af793ced5
SHA177fa1a6feb62bd77d30be181696802e13524da8d
SHA256b3ccfc4ddc7f6abf0fa7606be8495acd20c23f85ab23c2fa8bfe43e84befa126
SHA5126eb5963fa6d4cca6a2de25850cf47064d8ba523223a55048600fce8cadd120487507af50b0fd39c14b20bed3b976bb9510b5699efc7533e540350101c087ba2c