Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 21:36
Behavioral task
behavioral1
Sample
d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe
Resource
win10v2004-20220812-en
General
-
Target
d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe
-
Size
639KB
-
MD5
3f2e09688d1d541397f21dde3c36b220
-
SHA1
2bf2c4270f4ca60588cae9364a4461d50d66d25d
-
SHA256
d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93
-
SHA512
f1a739a6165d9276c1791d1f549dab82fe14bf92c01721c4a121c4ebd5567ffeb22037b46c5e61bbd332a9f70f4bdb6961749fa62e419bd0436bc12fdb6d6ca0
-
SSDEEP
12288:CXW8FEaaem9Ipuj35XJIbp5GaH6u7hPvJczfGT/RWUqZvqmYDsOtABt:CV8emPj3F+caHXcbOMeNGt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3412 qVXuoumkmBTzjHip.exe -
resource yara_rule behavioral2/memory/5020-134-0x0000000000400000-0x0000000000C05000-memory.dmp upx behavioral2/files/0x0007000000022e33-137.dat upx behavioral2/files/0x0007000000022e33-136.dat upx behavioral2/memory/3412-140-0x0000000000400000-0x0000000000C05000-memory.dmp upx behavioral2/memory/5020-143-0x0000000000400000-0x0000000000C05000-memory.dmp upx behavioral2/memory/3412-144-0x0000000000400000-0x0000000000C05000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\3345b71c-bfe7-40a3-a6c1-6eaa5d3999dd.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220920090544.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 5108 msedge.exe 5108 msedge.exe 540 identity_helper.exe 540 identity_helper.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5020 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 3412 qVXuoumkmBTzjHip.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 3412 5020 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 81 PID 5020 wrote to memory of 3412 5020 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 81 PID 5020 wrote to memory of 3412 5020 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 81 PID 5020 wrote to memory of 5108 5020 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 82 PID 5020 wrote to memory of 5108 5020 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 82 PID 5108 wrote to memory of 1468 5108 msedge.exe 83 PID 5108 wrote to memory of 1468 5108 msedge.exe 83 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 3812 5108 msedge.exe 86 PID 5108 wrote to memory of 4260 5108 msedge.exe 87 PID 5108 wrote to memory of 4260 5108 msedge.exe 87 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88 PID 5108 wrote to memory of 3828 5108 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe"C:\Users\Admin\AppData\Local\Temp\d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Roaming\Sun\Java\qVXuoumkmBTzjHip.exeC:\Users\Admin\AppData\Roaming\Sun\Java\qVXuoumkmBTzjHip.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.lady-impact.com/member/exe_contact.php?34443842364231432⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0xfc,0x100,0x40,0x104,0x7ffbec6746f8,0x7ffbec674708,0x7ffbec6747183⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:23⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:83⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3720 /prefetch:13⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:13⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5108 /prefetch:83⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:13⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6092 /prefetch:83⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:13⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:13⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:83⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3636 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff702535460,0x7ff702535470,0x7ff7025354804⤵PID:3188
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3500 /prefetch:83⤵PID:176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,10707663099016585607,15406435956350862050,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4048 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD53f2e09688d1d541397f21dde3c36b220
SHA12bf2c4270f4ca60588cae9364a4461d50d66d25d
SHA256d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93
SHA512f1a739a6165d9276c1791d1f549dab82fe14bf92c01721c4a121c4ebd5567ffeb22037b46c5e61bbd332a9f70f4bdb6961749fa62e419bd0436bc12fdb6d6ca0
-
Filesize
639KB
MD53f2e09688d1d541397f21dde3c36b220
SHA12bf2c4270f4ca60588cae9364a4461d50d66d25d
SHA256d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93
SHA512f1a739a6165d9276c1791d1f549dab82fe14bf92c01721c4a121c4ebd5567ffeb22037b46c5e61bbd332a9f70f4bdb6961749fa62e419bd0436bc12fdb6d6ca0