Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1742s -
max time network
1208s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-es -
resource tags
arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
03/01/2023, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
MultiMC/MultiMC.exe
Resource
win7-20220812-es
Behavioral task
behavioral2
Sample
MultiMC/MultiMC.exe
Resource
win10v2004-20220812-es
General
-
Target
MultiMC/MultiMC.exe
-
Size
8.6MB
-
MD5
86ec72e400abe379ed8453af49bbef32
-
SHA1
374abd6b7aa5687fc738ceee1df52be0994fd8bc
-
SHA256
10e44003255706995674e8dfdd43ce8242ee5f8402cafc8ec01e614d7c93dfa7
-
SHA512
846619daf0bce719aa8ce63962b5e68f498010a36608c842dd94f7235fa5ef36e35be77aba528169eb132f7971e4f6f6298b102cf49b0ed3a41e9dbbff98b4ae
-
SSDEEP
196608:jSFXkbPNSzhxpI+nIrTGEhiKhxJunHR/OcdpIX9uVvVV5cVY7VjVMSrV4rNVVjVJ:aXWWwwdiYVvVV5cVY7VjVMSrV4rNVVj7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\1998baf8-09dd-4501-9441-9c45d69c07ee.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230103113959.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2120 MultiMC.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2120 MultiMC.exe 2120 MultiMC.exe 612 msedge.exe 612 msedge.exe 4588 msedge.exe 4588 msedge.exe 1472 identity_helper.exe 1472 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2120 MultiMC.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2944 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2944 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2120 MultiMC.exe 2120 MultiMC.exe 2120 MultiMC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1352 2120 MultiMC.exe 79 PID 2120 wrote to memory of 1352 2120 MultiMC.exe 79 PID 2120 wrote to memory of 988 2120 MultiMC.exe 80 PID 2120 wrote to memory of 988 2120 MultiMC.exe 80 PID 2120 wrote to memory of 3252 2120 MultiMC.exe 81 PID 2120 wrote to memory of 3252 2120 MultiMC.exe 81 PID 2120 wrote to memory of 4588 2120 MultiMC.exe 91 PID 2120 wrote to memory of 4588 2120 MultiMC.exe 91 PID 4588 wrote to memory of 4256 4588 msedge.exe 92 PID 4588 wrote to memory of 4256 4588 msedge.exe 92 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 364 4588 msedge.exe 95 PID 4588 wrote to memory of 612 4588 msedge.exe 96 PID 4588 wrote to memory of 612 4588 msedge.exe 96 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98 PID 4588 wrote to memory of 1044 4588 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵PID:1352
-
-
C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵PID:988
-
-
C:\ProgramData\Oracle\Java\javapath\javaw.exejavaw -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.microsoft.com/link2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe4c1546f8,0x7ffe4c154708,0x7ffe4c1547183⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:23⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=3244 /prefetch:83⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3816 /prefetch:13⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:13⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --lang=es --service-sandbox-type=service --mojo-platform-channel-handle=5092 /prefetch:83⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --disable-gpu-compositing --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:13⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --lang=es --service-sandbox-type=service --mojo-platform-channel-handle=5552 /prefetch:83⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:83⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:2568 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff717ab5460,0x7ff717ab5470,0x7ff717ab54804⤵PID:1348
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --disable-gpu-compositing --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:13⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,923440622284103687,14378491617331030888,131072 --disable-gpu-compositing --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:13⤵PID:4904
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3cc 0x2fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140