Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/04/2023, 21:58

General

  • Target

    http://FBI.gov

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell start shell:Appsfolder\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge http://FBI.gov
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2200
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:5088
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4060
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3436
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4940
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4492
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:4856
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:2320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IV9H23MJ\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\GHN7MLX7\icon-link[1].js

    Filesize

    181B

    MD5

    11cecfbca2ac6031ba395897b6bf3288

    SHA1

    9f20dbc2db13d9c9fe0b15cba67af56a934e7b1e

    SHA256

    c10095ec4eaf105f05c9018a28603e5a805367a80387bc7539c62d54149c6bc8

    SHA512

    2875131b9c9925146802356eeb2e277dd1aefa7fb1eaa7c3ce4ff444a44d8651b968114040d8da1a692626844caa002b142ec61dd1118c02dd53b4b870bdd170

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\SW75JD0C\www.fbi[1].xml

    Filesize

    665B

    MD5

    9ab95a4dcc5b081a23f381887c92f52c

    SHA1

    fc7c51b7f667f54c6db9438078c95c9e64597485

    SHA256

    1190d11cabded1fc65fe6c77b6c7efe8bfefa90e7d049eb3a3e616a959e4d670

    SHA512

    a362c54948de8cda16de47304dde219e4004fe64f274dd3f4cf3fe89ee2db5baa993b9356d70ca91061449bad7820d8a3f74c58b33607290792fa3f6d56d67df

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\9APRHNVM\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\DPRAEQM1\1EQM2PO6.htm

    Filesize

    71KB

    MD5

    f2a12abfdf5e442ca571e29edbe896bc

    SHA1

    ad26bcd6574fcbe23d564e180ec617a204f21d1b

    SHA256

    fe406d3595b14ae0d813d880bfe31b9b96be8f4a1a7cc53f2c49334f300d46db

    SHA512

    504fec998dd3702527716ab94d8f01e1e497acf40bc6770bd9c5ef65ae477dc3c91edd20f31350597bd07d7b1a3eb8fbf2c4439cbf4fdbfac308a0b966c88b97

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XZJBBK60\favicon[1].ico

    Filesize

    161KB

    MD5

    bc6cbcdaf591798be452171fa0ac71d0

    SHA1

    c8d66d0482ed9e0034a55b14a68843881528c3ec

    SHA256

    4396818a6086e0ec3cb67c94df0ecebcced560abf69a697d64bd662721fc5936

    SHA512

    899bc392ad7fccb8659c1a84a3181e60d177239684c1edfaaf28cc92ff8af896efecb5e90efe300eb57bda86dad5aaaf64a52e34a239b3ae7a77039b1bba0e5f

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\dtqgzn3\imagestore.dat

    Filesize

    161KB

    MD5

    0df3c3138f4e021ebd433774bffe7632

    SHA1

    3f4e72108d2dc9041e41a40e18c5b2525df0a40b

    SHA256

    fbdeb0741ea0f048e26e782ebf012bd0a64fcfc4c3969e8d8bf265e84276719a

    SHA512

    c118306a7d86083ac1cb8553ea79be66c3fd4c44c139001ca8f911aa5abd73650539ab207c3b2910ae155686aeddd93e5fcae239b631780099af3d0cf2ccf3d2

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\Windows\3720402701\2219095117.pri

    Filesize

    207KB

    MD5

    e2b88765ee31470114e866d939a8f2c6

    SHA1

    e0a53b8511186ff308a0507b6304fb16cabd4e1f

    SHA256

    523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

    SHA512

    462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_odhkunjn.xdg.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • memory/2200-132-0x000001CCA6910000-0x000001CCA6920000-memory.dmp

    Filesize

    64KB

  • memory/2200-131-0x000001CCA6910000-0x000001CCA6920000-memory.dmp

    Filesize

    64KB

  • memory/2200-130-0x000001CCC2AB0000-0x000001CCC2B26000-memory.dmp

    Filesize

    472KB

  • memory/2200-126-0x000001CCA84B0000-0x000001CCA84D2000-memory.dmp

    Filesize

    136KB

  • memory/4940-394-0x0000015E43920000-0x0000015E43A20000-memory.dmp

    Filesize

    1024KB

  • memory/4940-361-0x0000015E41510000-0x0000015E41512000-memory.dmp

    Filesize

    8KB

  • memory/4940-285-0x0000015E40560000-0x0000015E40660000-memory.dmp

    Filesize

    1024KB

  • memory/4940-284-0x0000015E40CA0000-0x0000015E40CA2000-memory.dmp

    Filesize

    8KB

  • memory/4940-289-0x0000015E406A0000-0x0000015E406A2000-memory.dmp

    Filesize

    8KB

  • memory/4940-291-0x0000015E40BA0000-0x0000015E40BA2000-memory.dmp

    Filesize

    8KB

  • memory/4940-298-0x0000015E40BD0000-0x0000015E40BD2000-memory.dmp

    Filesize

    8KB

  • memory/4940-301-0x0000015E40C00000-0x0000015E40C02000-memory.dmp

    Filesize

    8KB

  • memory/4940-305-0x0000015E40C10000-0x0000015E40C12000-memory.dmp

    Filesize

    8KB

  • memory/4940-309-0x0000015E40730000-0x0000015E40732000-memory.dmp

    Filesize

    8KB

  • memory/4940-314-0x0000015E40770000-0x0000015E40772000-memory.dmp

    Filesize

    8KB

  • memory/4940-318-0x0000015E40790000-0x0000015E40792000-memory.dmp

    Filesize

    8KB

  • memory/4940-321-0x0000015E407B0000-0x0000015E407B2000-memory.dmp

    Filesize

    8KB

  • memory/4940-351-0x0000015E43100000-0x0000015E43200000-memory.dmp

    Filesize

    1024KB

  • memory/4940-358-0x0000015E410F0000-0x0000015E410F2000-memory.dmp

    Filesize

    8KB

  • memory/4940-276-0x0000015E40540000-0x0000015E40542000-memory.dmp

    Filesize

    8KB

  • memory/4940-380-0x0000015E3FEC0000-0x0000015E3FFC0000-memory.dmp

    Filesize

    1024KB

  • memory/4940-269-0x0000015E40500000-0x0000015E40502000-memory.dmp

    Filesize

    8KB

  • memory/4940-422-0x0000015E43600000-0x0000015E43700000-memory.dmp

    Filesize

    1024KB

  • memory/4940-446-0x0000015E42420000-0x0000015E42520000-memory.dmp

    Filesize

    1024KB

  • memory/4940-262-0x0000015E40550000-0x0000015E40552000-memory.dmp

    Filesize

    8KB

  • memory/4940-655-0x0000015E401D0000-0x0000015E401F0000-memory.dmp

    Filesize

    128KB

  • memory/5088-478-0x0000022AEED40000-0x0000022AEED41000-memory.dmp

    Filesize

    4KB

  • memory/5088-203-0x0000022AED3A0000-0x0000022AED3A2000-memory.dmp

    Filesize

    8KB

  • memory/5088-202-0x0000022AED340000-0x0000022AED342000-memory.dmp

    Filesize

    8KB

  • memory/5088-200-0x0000022AE8C30000-0x0000022AE8C32000-memory.dmp

    Filesize

    8KB

  • memory/5088-198-0x0000022AE8BC0000-0x0000022AE8BC1000-memory.dmp

    Filesize

    4KB

  • memory/5088-177-0x0000022AE9000000-0x0000022AE9010000-memory.dmp

    Filesize

    64KB

  • memory/5088-161-0x0000022AE8720000-0x0000022AE8730000-memory.dmp

    Filesize

    64KB

  • memory/5088-476-0x0000022AEED30000-0x0000022AEED31000-memory.dmp

    Filesize

    4KB