Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

24/09/2022, 15:34

220924-szzwcabee3 1

24/09/2022, 15:32

220924-sy4g5schar 1

Analysis

  • max time kernel
    109s
  • max time network
    114s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/09/2022, 15:34

General

  • Target

    http://amogus.com

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://amogus.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4948
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3576.0.1688986723\1469216736" -parentBuildID 20200403170909 -prefsHandle 1532 -prefMapHandle 1352 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3576 "\\.\pipe\gecko-crash-server-pipe.3576" 1612 gpu
        3⤵
          PID:3824
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3576.3.1830388395\1216443774" -childID 1 -isForBrowser -prefsHandle 2260 -prefMapHandle 2256 -prefsLen 156 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3576 "\\.\pipe\gecko-crash-server-pipe.3576" 2272 tab
          3⤵
            PID:5084
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3576.13.887046530\257862503" -childID 2 -isForBrowser -prefsHandle 3480 -prefMapHandle 3476 -prefsLen 6938 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3576 "\\.\pipe\gecko-crash-server-pipe.3576" 3492 tab
            3⤵
              PID:4236

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          07149bdd639826419e083a26419257c2

          SHA1

          a8e6f0b4f6fc6e51803f4c9e46af728969de3f67

          SHA256

          ebbe45f802e0679a14fc030c6cbcfa453183b54d5f26e7f26b40b377f97598cd

          SHA512

          79630d054c2da35857dae03406e467294128a69fe4e0ccf10976e3a2d01645f2cf6ce5b1b90110872d04ee82dff29103e8e14439ff38c6309ec84fcf171623ef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          de80af6c66bfed9688f9b54d98073e5e

          SHA1

          723f2bceec8b2db90d13e80db2e423e906972b55

          SHA256

          a44ed5e2fd2a480f4f514ea05f17832974513b262d84ad4867a53a44896b0ab7

          SHA512

          3b059cf490cca5724925d3298e2cd5c3088ab8054caf5eef89cc45c3971334b6ad90603a953888ec0f883bdfb641ffc26f3c2825d915fc596e26366ec649adda

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\8W6IVD7K.cookie

          Filesize

          610B

          MD5

          533d5adb019101e95d9c52d1f0347412

          SHA1

          cb54d511140384306e98c6c68ba65ccb8dba58c9

          SHA256

          6d6b86d2d8792511b272820cf57524968f9367a0cb82bce342c315e50a3001a1

          SHA512

          8bf852d628048b1fe8896baccfafd83c2ab0d20d54dddf12ccd982f53bf3e203991989e2946dfd364b6e7cd1a50f5d0360579d5fc9646e571ec65bf4fef239f4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\A99ZRXT4.cookie

          Filesize

          610B

          MD5

          ce5285dbb4768de802bb35fa2106477f

          SHA1

          b2c549a17ccbec47bf60384005f81ae5d2576ebe

          SHA256

          e0a2fb6f22068ef6bec036985674d7d3e31f4c0135b769211eb440ac55cccdd2

          SHA512

          13aaa45781ef4125eba470e4d8ba954552fa3a18ee64c775f852b64bc03524793c188e055a3e60d24f301236e73142972ac7bd94a98365317a7f6532b8545f7e