Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/03/2023, 00:39

General

  • Target

    https://9529260.fls.doubleclick.net/activityi;dc_pre=CMvoovuW3_0CFaOT2AUd2dwDGA;src=9529260;type=invmedia;cat=south000;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=2075953867680.7976?

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://9529260.fls.doubleclick.net/activityi;dc_pre=CMvoovuW3_0CFaOT2AUd2dwDGA;src=9529260;type=invmedia;cat=south000;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;ord=2075953867680.7976?
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4116 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4104
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4592
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4420
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5088
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    d4ccf82269b1f99499622edacf84d5ce

    SHA1

    1454dc3c450b85b34c151ddacd93615b940f2c07

    SHA256

    a40962bd1a9e00f869615fb13b660e00443c90958bbc4ac77b567865239779c3

    SHA512

    eac0b2f13f2a63832bdfe154787e5221903713d9d8f8ea073d18f875c007c4f52fc33290aa260f1863beb6d667745ba02174c08689fce158a99fb3b78203e736

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_DAB7A7601883675FE6BFFEBF9105B342

    Filesize

    470B

    MD5

    8d3a855f36088dff154571644b544a4e

    SHA1

    84538152a39cfcca692f8cdb1d4106f5c385dcee

    SHA256

    aead6a28d1ad701f5528e4cbe93589318441dd1f3846c77fdfd39dc608603bc9

    SHA512

    046a6573f4961afab453fec70bcb7c949e7260d34eb520cf9bdb93848b13d9d088576ef8ebd327c30df7e4c50b6abd42c025bb0b6fab35ddda8dba16ad2fd981

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    724B

    MD5

    f569e1d183b84e8078dc456192127536

    SHA1

    30c537463eed902925300dd07a87d820a713753f

    SHA256

    287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

    SHA512

    49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    0ebff5dc156e4252918e2c10d55cab58

    SHA1

    ea7b1f3654704a6a1dcb305f168412cc9034fcf0

    SHA256

    ae40682da957b91b11bf69a4823163faf97e0f4e8f5e5aeb5728fa5a3295f4f3

    SHA512

    4f87227a3993ecfd7af0bb3421d4b602371a273b6a48de0d6189ceb593d28e421b6177083eaea5ae39b89ceecde06de02f03af76aeef2588eea00c74f1396df2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_DAB7A7601883675FE6BFFEBF9105B342

    Filesize

    414B

    MD5

    fe62f7e48113ba2a19a271b79cbfba69

    SHA1

    4ab9168541ebc1dcbac9ae6af80c6b76c38cd937

    SHA256

    4397d9dec444c311fb50f23da5a96984318fee52796f7cadcd9ff1dfd9e78a4b

    SHA512

    5c72694a302787063ed04ec6acc09503faa85d08d051dc14dc7f8ffa59cbfa3d10f74372f15c3d64fb1a500cf94fe76d1b6c1e52f47825baa355bacab560271a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    392B

    MD5

    264be6d7f0b43fbf074ef85fe87a989d

    SHA1

    99deee6e36568f3138658ea71e33618c6461bbb1

    SHA256

    69cddcb30bd228d3184dcdc8b1ba71197fecde96c5ea47dec96c1d7816d83042

    SHA512

    215d4c1dfa529075c1f13220502e9646e73213d6397fdb6db4ab3d3ce67b59d436106254915e8042670251c730f1f28596610bb5830b793ad39af7d46a839333

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver3C9.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\B1FTPK9F\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\BKE88VQN.cookie

    Filesize

    611B

    MD5

    9efeed4337f9fa8c6762029b11e14756

    SHA1

    2d6d41ef1c7831e0c12fe0f82d1f76c49709b940

    SHA256

    55d37d0e2ab83c9072b6ae07cdea7675391ec98983ef668a6b0006f2cb80b418

    SHA512

    665e39b0de3e163811f79ed9f0057b789eada665fcac6a71c6ddb724a9d49d9cd3166bd2c3c030f53cbacf1aabffc9b3a1c3ed532863e2a0868073e0e39ab5b0

  • memory/4592-177-0x000002842BAA0000-0x000002842BAA1000-memory.dmp

    Filesize

    4KB

  • memory/4592-181-0x000002842FF70000-0x000002842FF72000-memory.dmp

    Filesize

    8KB

  • memory/4592-182-0x000002842FFD0000-0x000002842FFD2000-memory.dmp

    Filesize

    8KB

  • memory/4592-183-0x000002842FE40000-0x000002842FE42000-memory.dmp

    Filesize

    8KB

  • memory/4592-186-0x000002842BAA0000-0x000002842BAA1000-memory.dmp

    Filesize

    4KB

  • memory/4592-190-0x000002842B5F0000-0x000002842B5F1000-memory.dmp

    Filesize

    4KB

  • memory/4592-179-0x000002842BAE0000-0x000002842BAE2000-memory.dmp

    Filesize

    8KB

  • memory/4592-158-0x000002842BC40000-0x000002842BC50000-memory.dmp

    Filesize

    64KB

  • memory/4592-140-0x000002842B420000-0x000002842B430000-memory.dmp

    Filesize

    64KB