Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 11:24

General

  • Target

    nitro token checker/main.py

  • Size

    8KB

  • MD5

    649a709b7209c052c3cde8974099c6f1

  • SHA1

    20fa00f6e0ef8b7b00b6f260afea1c3d30945517

  • SHA256

    8136be8724d22b63e91da0853ea31dea629e69c8dc78001416a1a9bfb483b90a

  • SHA512

    c910ffe4e6ecc4d303fe8474ca73403c373ae532a5e4350445037a50c5652854437fb92a78da2bf7e933b1e33aec0f83f99db6e03dcffaec368a88b51ec22643

  • SSDEEP

    192:Bcg5dVg5Hg5Kg5srS4qdBohi/BAfO/bO7I7kgTC/hy:mg5Lg5Hg5Kg5srSlowAR7I7/TC/g

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\nitro token checker\main.py"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\nitro token checker\main.py
      2⤵
      • Modifies registry class
      PID:2696
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6739758,0x7fef6739768,0x7fef6739778
      2⤵
        PID:2832
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:2
        2⤵
          PID:2616
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1480 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:8
          2⤵
            PID:2648
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:8
            2⤵
              PID:2156
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:1
              2⤵
                PID:2576
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:1
                2⤵
                  PID:600
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1392 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:2
                  2⤵
                    PID:2536
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1288 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:1
                    2⤵
                      PID:2148
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3448 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:8
                      2⤵
                        PID:1916
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3564 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:8
                        2⤵
                          PID:2212
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3452 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:1
                          2⤵
                            PID:2524
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3440 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:8
                            2⤵
                              PID:2092
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2348 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:1
                              2⤵
                                PID:1480
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3076 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:1
                                2⤵
                                  PID:1712
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1604 --field-trial-handle=1376,i,3152273684563446075,13956456319066206069,131072 /prefetch:1
                                  2⤵
                                    PID:1508
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:484

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\535f85bb-9691-43d6-b92f-87dc910723b8.tmp

                                    Filesize

                                    6KB

                                    MD5

                                    817f8beebbcc498c617d0d5249c8dac9

                                    SHA1

                                    ce2d936aa5467b3733eacd2404bbe50f2d195d20

                                    SHA256

                                    f16a5f14c989922a76910775323a3531170e46b9cb4d53d69331cdee815ebf88

                                    SHA512

                                    b1d96231205a4d2aa17eb1ae9cf7211b3230c4fbe9f4614b9d4e0ca7713bce04ca6d7702a284982ab126c569b4aee2ef938884ba67836f50a2da7a7909e67098

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    888B

                                    MD5

                                    0949bea68eac4bc8a7dd30e143d12844

                                    SHA1

                                    993de4082d701a344c721eb7c405e892714cb78d

                                    SHA256

                                    c2a4e66e7974df27bc169d5cebdeb862957780fff4893f5b9866eecc85629c9a

                                    SHA512

                                    dbf7d5d0b763adb46bfae04c4693abc0ec0fa9745b9b4de9115229bf1670b571cc9e79ca89d485145171d70a23851628081f37cd37c89743d5b986f3befc01fb

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                    Filesize

                                    16B

                                    MD5

                                    aefd77f47fb84fae5ea194496b44c67a

                                    SHA1

                                    dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                    SHA256

                                    4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                    SHA512

                                    b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    abe3db1a36a25cc7db4987037b81b0f4

                                    SHA1

                                    8afa22c1d0288e2ff530d8accd63e2da5679565a

                                    SHA256

                                    f799318c29ac2f5bd0a3d1a5ff236fe80c307adb0a58dec11ed0225c81371198

                                    SHA512

                                    d0034c0f4007f04734aa7fcf03d412cc9dd3bfcc9245c0115a3cdd8cab697ad3196eed76ccbbabe7111e54481465fbab2eb2b7b530cd99834285b94c1581644c

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    1b0aa3beef7cfe7b02338b4141630391

                                    SHA1

                                    df048a5d6931dc7550545ea472cade0c26f2b6ba

                                    SHA256

                                    6f81080592ee63222fab0cc8fd96ef21e4a7dc0e1b057d2210fc2cd8a8576806

                                    SHA512

                                    32fce37d4451275f1d8eaf3a2b8f330bf7e1bba138de0fcb3b0b9c9a2b12e483498a517264701a238d96e8f943bcb406fa1ff987318abe65e9555ca0c3543a46

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT~RFf76e531.TMP

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                    Filesize

                                    16B

                                    MD5

                                    18e723571b00fb1694a3bad6c78e4054

                                    SHA1

                                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                    SHA256

                                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                    SHA512

                                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d98744b4-2a72-4805-bd92-e522d74d08e0.tmp

                                    Filesize

                                    6KB

                                    MD5

                                    fa8b989d815f10c0964ef98158adf704

                                    SHA1

                                    debd6ba6acf2ea049b64ac9475a01c676d3caf34

                                    SHA256

                                    52396582165b5eac71aafee7c922ef06324339dfcb535f12ba5d108fc7f6b562

                                    SHA512

                                    3272e42c6a5f36edceec2b24a6fcdb7bcc76593670861c10419b94654b3d49a641cb8eedb1e6ade9cf80b2a97a9ea29bfeb6d652e4828fb6c1a6fb6aed66bb91

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    351KB

                                    MD5

                                    93ac5012510cc36f6a459f9a7b6425d4

                                    SHA1

                                    5c0735e73daa57c9890f6618ad55a958209cbbf1

                                    SHA256

                                    bd907d058be69ac21601a49693cfccdc99fb133540058cc4b41f0664b85c48fa

                                    SHA512

                                    73dbd85f66305a4276721e502a94a6cc3b21d3d053c933b4f4bf56cd7597671fdcf8997fa51116af195698ab64fdbcf54a0d2cbd091c62ac04415a71eaff79d1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\cf84f916-b57c-4c00-a845-a2f508a8a564.tmp

                                    Filesize

                                    350KB

                                    MD5

                                    168c549b3a65a9e1ee1d1307fdf48521

                                    SHA1

                                    76b9ce0f0ebfdf48c3c29f0df0424432c56b7c45

                                    SHA256

                                    e609521b6d2a2505777498a5e6b1b80debbba190343e5bfef78cb5258b010f67

                                    SHA512

                                    941d42ff3404d9a54788a57a464b3d65314a16ad03c42101f6b73a4c92f594480087417210f4b336fbb3cedfbaefd2857f3c528b14c0418923f8925947f0a0a7