Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe
Resource
win10v2004-20221111-en
General
-
Target
e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe
-
Size
426KB
-
MD5
1269f325cf85ef7661e389965bbe9f20
-
SHA1
2f387f399df006f2980495a1cdbf06a63f794f3c
-
SHA256
e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50
-
SHA512
6c5ae3456758f082744cafbc300695fe5f2cfcbafb824510e2c040975688be3339c3e38b7ab1a8dfa065a4d1f7bcfcc4e8b9bfcb5d2cd9d218dfac7264dfa87e
-
SSDEEP
6144:ycD0z5qh2tlU8Dv7XRzZXUjdmj7aN3dJ9HaT7Ov4zmRBchuLAAk6ypDvxxoRAU+m:5YtbtfDzXl0sjONwjaRB4RzpDeAUVv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5104 msedge.exe 5104 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 1420 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 83 PID 400 wrote to memory of 1420 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 83 PID 400 wrote to memory of 1420 400 e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe 83 PID 1076 wrote to memory of 3844 1076 explorer.exe 86 PID 1076 wrote to memory of 3844 1076 explorer.exe 86 PID 3844 wrote to memory of 2400 3844 msedge.exe 88 PID 3844 wrote to memory of 2400 3844 msedge.exe 88 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 4220 3844 msedge.exe 95 PID 3844 wrote to memory of 5104 3844 msedge.exe 96 PID 3844 wrote to memory of 5104 3844 msedge.exe 96 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97 PID 3844 wrote to memory of 2600 3844 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe"C:\Users\Admin\AppData\Local\Temp\e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.513cg.com2⤵PID:1420
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.513cg.com/2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0x78,0x124,0x7ffb810f46f8,0x7ffb810f4708,0x7ffb810f47183⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,7504617819865760518,10252080990918983842,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:23⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,7504617819865760518,10252080990918983842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,7504617819865760518,10252080990918983842,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:83⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,7504617819865760518,10252080990918983842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,7504617819865760518,10252080990918983842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:1484
-
-