Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
9zonesszanp...��.exe
windows7-x64
8zonesszanp...��.exe
windows10-2004-x64
8zonesszanp...EL.dll
windows7-x64
8zonesszanp...EL.dll
windows10-2004-x64
8zonesszanp...��.url
windows7-x64
1zonesszanp...��.url
windows10-2004-x64
1zonesszanp...��.url
windows7-x64
1zonesszanp...��.url
windows10-2004-x64
1Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 19:12
Behavioral task
behavioral1
Sample
zonesszanpinglun-v1.0/QQ空间秒赞秒评论(秒赞贴吧).exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
zonesszanpinglun-v1.0/QQ空间秒赞秒评论(秒赞贴吧).exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
zonesszanpinglun-v1.0/SkinH_EL.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
zonesszanpinglun-v1.0/SkinH_EL.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
zonesszanpinglun-v1.0/去脚本之家看看.url
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
zonesszanpinglun-v1.0/去脚本之家看看.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
zonesszanpinglun-v1.0/服务器软件.url
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
zonesszanpinglun-v1.0/服务器软件.url
Resource
win10v2004-20220812-en
General
-
Target
zonesszanpinglun-v1.0/QQ空间秒赞秒评论(秒赞贴吧).exe
-
Size
1.6MB
-
MD5
f29d9bca9f069a84076593270496e3a1
-
SHA1
a6f907bd2dfdd4ab81f9ebe3cb070c5430ed8632
-
SHA256
d30c3cf612a35cf8bd52582f006afb580ebdad17c648a09b54cf6bbb2fd6ee57
-
SHA512
4915962d2ead9bf33433d778b34abd2ccad4367d8adf191ec0d9e7551bfc8fa5d0e50d60fee4fa1feef8e3bff3d9c3c285e3d7513743afed1221fd3f9c8c7dbf
-
SSDEEP
24576:B6m4SE6FSbxSDQxlTZaqdiXSp0c02uFG6dAk3CMbES:BXEJAAlTZaqdwk0c05HGibN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4736-134-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\b763ebc6-a83a-483a-abe1-142b425d87ff.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221126042233.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 3544 msedge.exe 3544 msedge.exe 2380 identity_helper.exe 2380 identity_helper.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4736 QQ空间秒赞秒评论(秒赞贴吧).exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4736 QQ空间秒赞秒评论(秒赞贴吧).exe 4736 QQ空间秒赞秒评论(秒赞贴吧).exe 4736 QQ空间秒赞秒评论(秒赞贴吧).exe 4736 QQ空间秒赞秒评论(秒赞贴吧).exe 4736 QQ空间秒赞秒评论(秒赞贴吧).exe 4736 QQ空间秒赞秒评论(秒赞贴吧).exe 4736 QQ空间秒赞秒评论(秒赞贴吧).exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3544 4736 QQ空间秒赞秒评论(秒赞贴吧).exe 77 PID 4736 wrote to memory of 3544 4736 QQ空间秒赞秒评论(秒赞贴吧).exe 77 PID 3544 wrote to memory of 4140 3544 msedge.exe 78 PID 3544 wrote to memory of 4140 3544 msedge.exe 78 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 3988 3544 msedge.exe 81 PID 3544 wrote to memory of 4056 3544 msedge.exe 82 PID 3544 wrote to memory of 4056 3544 msedge.exe 82 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84 PID 3544 wrote to memory of 4456 3544 msedge.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\zonesszanpinglun-v1.0\QQ空间秒赞秒评论(秒赞贴吧).exe"C:\Users\Admin\AppData\Local\Temp\zonesszanpinglun-v1.0\QQ空间秒赞秒评论(秒赞贴吧).exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.2345.com/?k5200000000002⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffa06c746f8,0x7ffa06c74708,0x7ffa06c747183⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:23⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3256 /prefetch:83⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:13⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:13⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5500 /prefetch:83⤵PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:13⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:13⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:13⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6948 /prefetch:83⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7084 /prefetch:13⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7100 /prefetch:13⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:83⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:2276 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff791da5460,0x7ff791da5470,0x7ff791da54804⤵PID:1252
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6748 /prefetch:83⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6556 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,13994281362196703896,533882264327562434,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6656 /prefetch:83⤵PID:3936
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836