Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
192s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe
Resource
win10v2004-20221111-en
General
-
Target
a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe
-
Size
137KB
-
MD5
0b20e0c3e0b1fcdbf35bc033dd925a00
-
SHA1
2d4ad10bd65c99bbbfc9e7f44c7a4bcf0518f495
-
SHA256
a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657
-
SHA512
e238996860308474a8e3de8f27bf76fe77b46348245ab001533ab1686f99a4c31e415a203bc7ebe63a1723b428c15143e4203fcf2f069e49d92d2399534b4b77
-
SSDEEP
3072:nDYhPk5Hb4QXTiKZ7dYaATMl3FoFBZkIKz0RDx/Eqk1e:ng85HsyTiKPUMtOfmIR5O
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1268 4316 WerFault.exe 81 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Download a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4768 msedge.exe 4768 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4948 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4316 a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4316 wrote to memory of 4700 4316 a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe 86 PID 4316 wrote to memory of 4700 4316 a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe 86 PID 4700 wrote to memory of 4596 4700 msedge.exe 87 PID 4700 wrote to memory of 4596 4700 msedge.exe 87 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 2152 4700 msedge.exe 90 PID 4700 wrote to memory of 4768 4700 msedge.exe 91 PID 4700 wrote to memory of 4768 4700 msedge.exe 91 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92 PID 4700 wrote to memory of 752 4700 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe"C:\Users\Admin\AppData\Local\Temp\a366ae4ff148f1e26fa04b91ac05ee997b74d619c12806e5718c52c70726a657.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 3882⤵
- Program crash
PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=gOO_UqzEc5Y2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8102b46f8,0x7ff8102b4708,0x7ff8102b47183⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:23⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:83⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4816 /prefetch:83⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:13⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:13⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5308 /prefetch:83⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:13⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:13⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6364 /prefetch:83⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13225465970660272141,17499908121236777028,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5892 /prefetch:23⤵PID:2112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4316 -ip 43161⤵PID:3760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3592
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x2c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:4948