Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe
Resource
win10v2004-20220812-en
General
-
Target
330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe
-
Size
143KB
-
MD5
3f0b49449db35d26ccf73c069c1ee589
-
SHA1
106ee20726c8714a9a9db9e87afff50e77cf3507
-
SHA256
330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3
-
SHA512
230a70fcca35a857da2025438b0cc527826cefa67b0a0247407c576bbf3f986db06158a094592b03c0bc5a1e781d54634431d26200846a8c97aa39ca677bd5f8
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45Ds:pe9IB83ID54
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\c69bd8d2-5568-486d-9842-808170423b64.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221128094447.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 4032 msedge.exe 4032 msedge.exe 4560 identity_helper.exe 4560 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 532 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 532 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 3184 532 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe 88 PID 532 wrote to memory of 3184 532 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe 88 PID 532 wrote to memory of 3184 532 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe 88 PID 3184 wrote to memory of 4032 3184 cmd.exe 90 PID 3184 wrote to memory of 4032 3184 cmd.exe 90 PID 4032 wrote to memory of 1684 4032 msedge.exe 92 PID 4032 wrote to memory of 1684 4032 msedge.exe 92 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 940 4032 msedge.exe 95 PID 4032 wrote to memory of 1936 4032 msedge.exe 96 PID 4032 wrote to memory of 1936 4032 msedge.exe 96 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98 PID 4032 wrote to memory of 1436 4032 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe"C:\Users\Admin\AppData\Local\Temp\330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5301121^&rsn=plde^&details=^|v6.2.9200x64sp0.0ws^|tt31^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://securedfileinfo.com/404.jsp?chid=5301121&rsn=plde&details=|v6.2.9200x64sp0.0ws|tt31|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffb629146f8,0x7ffb62914708,0x7ffb629147184⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:24⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3144 /prefetch:84⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:14⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:14⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5244 /prefetch:84⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:14⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5628 /prefetch:84⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:14⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:14⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6308 /prefetch:84⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x148,0x144,0x13c,0x130,0x140,0x7ff69a975460,0x7ff69a975470,0x7ff69a9754805⤵PID:1328
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6308 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:84⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2144,17824006387476374053,16667418703650199662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:84⤵PID:3720
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5167cfd90cb81d3dddd63f107249a0f2e
SHA139a78631cc336bb71fe7a02eeb91474bbc335eea
SHA2564c527164ea0096494cfd68b9e9167c0587c162106e8ec71edc705963c9fc543b
SHA512013a16d1dc963bf536a156ccb6ea94596887e1d774d6b18636000bbda06b57c135bac00ef046d18022b8512d6abb9bffd3c26b6d10998b4f0e86b46c319b7911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD57641b5edd4a972d89d685806d2e5b62f
SHA1f7ef6fbfd5ee5d2dc1674511d32bfc592114b544
SHA25615dcd36f3369839f86afa4e19fd660abd6434a791059093ce387951f594d0de6
SHA512dc40d7129b56ab4f482d84ebc3e20fb28ab047c7b79f0b566ec06fcf6661bc3eaf1f2914efaf88256f68e3033f91aa99d2f0ab9b8bc00013f71b6babc4dc7222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD55872b4063762149604316a79a3acfb18
SHA1b32e9e70e2e85dc1120771560fa027f05fa03198
SHA256d162ae6b6a980e3fc1dd1b380e7355fdf54ce3a2b12269e7defaa9b2b3ed789e
SHA512279d0371e71a7c6f78b213299e2df4a2aa904214f8ff80913643861e394b3756f39a1bc2e19f459b29d6db4f1dceef2e3a8a9a1c4a3270b336474b15853265f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD564648e5f9a755fb2aeaef4b5e47dda7e
SHA192de2ee39cd07f032efa5f8ec3e1428c8741e86b
SHA25647dd791d212f3b2314b330b763bd3ecbcb603fbe9ee7f97fec881c0f1c72c564
SHA512443d647e0dbfdda2d24d89ad62118c3928b168799eca177c4ae4ddb7faacc220f12e8f1e389a6d8e6786835d0f6ac9a8c96c9b2d5bc1c11d8da306e841fb9ba6