Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 09:55
Behavioral task
behavioral1
Sample
f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe
Resource
win10v2004-20221111-en
General
-
Target
f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe
-
Size
254KB
-
MD5
3706012b64ec33cc42fc0fa5ab16f59c
-
SHA1
5fccfc16a2a9a2bf8f65146bc1475c74246e14f8
-
SHA256
f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f
-
SHA512
7804f64b11c0799123d0b5336a5e0d9d6e6b1e84645d3c86bbe2b7225be51072ad97750d2312defe0375fa369d8799bb687b07d9b5a0cc978e311fce76dea6d0
-
SSDEEP
6144:/eJX9qXL9zZNLGkrOmfmMcctVRYaxU6xy:WJ9qXL9VNCBm+IDRY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/740-132-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/740-135-0x0000000000400000-0x00000000004A5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\x = "C:\\Windows\\system32\\x.exe" f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\x.exe f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe File opened for modification C:\Windows\SysWOW64\x.exe f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.xxxsupersearch.info" f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 2348 msedge.exe 2348 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 2348 740 f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe 84 PID 740 wrote to memory of 2348 740 f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe 84 PID 2348 wrote to memory of 3760 2348 msedge.exe 85 PID 2348 wrote to memory of 3760 2348 msedge.exe 85 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4544 2348 msedge.exe 89 PID 2348 wrote to memory of 4400 2348 msedge.exe 88 PID 2348 wrote to memory of 4400 2348 msedge.exe 88 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90 PID 2348 wrote to memory of 4928 2348 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe"C:\Users\Admin\AppData\Local\Temp\f45c635c74e92ac897094026d8680df676e9f4915385828973a3f4ddbf4ec24f.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtubeofhdporn.com/ads/open.php2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff81f7546f8,0x7ff81f754708,0x7ff81f7547183⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:83⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:13⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:13⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5008 /prefetch:83⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:13⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:13⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4244 /prefetch:83⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:13⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:13⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:13⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1284 /prefetch:13⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3589221357855077189,12431861910433971372,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4420 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:376