Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    46s
  • max time network
    46s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2023, 13:08

General

  • Target

    Evon/Evon.exe

  • Size

    6.4MB

  • MD5

    8a3a3c1c0ff62fab204c8e6e76e477a7

  • SHA1

    50fde23d977cc384eec65b4dc20e6c76749a1208

  • SHA256

    b5d324e31f58cb59eaeecbbb4f743ca474f7acefd1326ded5ae2c77866f55238

  • SHA512

    20705142e476d7ee1f3d6133020a74b42fcb12c1513b4d4ef28ca254226802a6926b90dcf18f673af47b964ceca7a26674307ecf5500b4e41a7a047a31718169

  • SSDEEP

    98304:6FmsG+4eOpS9qWNXNgCp6aGBwHCcmmxVA5/xDnLx0yu+5TpUz:yDGw9f92CnPhATd0yHg

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Evon\Evon.exe
    "C:\Users\Admin\AppData\Local\Temp\Evon\Evon.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/YpXFb3xUqz
      2⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffebab446f8,0x7ffebab44708,0x7ffebab44718
        3⤵
          PID:3332
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:2
          3⤵
            PID:3244
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4996
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2996 /prefetch:8
            3⤵
              PID:3412
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:1
              3⤵
                PID:3476
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:1
                3⤵
                  PID:5048
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17804111256679922410,6622350332795499903,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:1
                  3⤵
                    PID:2280
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:4976

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  0820611471c1bb55fa7be7430c7c6329

                  SHA1

                  5ce7a9712722684223aced2522764c1e3a43fbb9

                  SHA256

                  f00d04749a374843bd118b41f669f8b0a20d76526c34b554c3ccac5ebd2f4f75

                  SHA512

                  77ea022b4265f3962f5e07a0a790f428c885da0cc11be0975285ce0eee4a2eec0a7cda9ea8f366dc2a946679b5dd927c5f94b527de6515856b68b8d08e435148

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  425e83cc5a7b1f8edfbec7d986058b01

                  SHA1

                  432a90a25e714c618ff30631d9fdbe3606b0d0df

                  SHA256

                  060a2e5f65b8f3b79a8d4a0c54b877cfe032f558beb0888d6f810aaeef8579bd

                  SHA512

                  4bf074de60e7849ade26119ef778fe67ea47691efff45f3d5e0b25de2d06fcc6f95a2cfcdbed85759a5c078bb371fe57de725babda2f44290b4dc42d7b6001af

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                  Filesize

                  120B

                  MD5

                  aca502641721eca90b81612d801b06d1

                  SHA1

                  ca65a24de6f375bd9a3c2d92dcd9dd6bd21ae71a

                  SHA256

                  17614e086e7b6b1196570f74920257e291f2659d4a71a41190f3018d36298241

                  SHA512

                  3bc1521ad27d4ee871e90e2de6e92e55b6f7360d50ca4f64210536221e25eacfeebc1dc35929393a811d6c8c9a9c79bf428d7345211d33da36aae138f776fa02

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe56dc1c.TMP

                  Filesize

                  48B

                  MD5

                  7f1294e9ae3d49a6561f17dbec49eb77

                  SHA1

                  11470b8ea5475da1a2abcd8c4d8cf0ce8a26b17c

                  SHA256

                  666502462e1f6a4bcd36602e6f9fae0beb9a9f48dcafc74c5994463aeff51ea3

                  SHA512

                  e545585cef544604063ce88952f9d26163651aefe3f9239648f19634f8a324f101a46a5aaef7b0f87f356d4c3cc5c0b2ec039bbf7826e6309d597c83550dc96e

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                  Filesize

                  70KB

                  MD5

                  e5e3377341056643b0494b6842c0b544

                  SHA1

                  d53fd8e256ec9d5cef8ef5387872e544a2df9108

                  SHA256

                  e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                  SHA512

                  83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnk

                  Filesize

                  2KB

                  MD5

                  efddc4b4da454548d752549e017dfe46

                  SHA1

                  dad8ecb763a7a6125734f2a26c6e83efe01d5aa0

                  SHA256

                  de92f1289746d909aee01d3ea13608ea5aabc7ee818a7cbb136dc4e84142fbba

                  SHA512

                  cc7f733906029af08d4f5f2c7be4e6b5034f509735a168b91fca557e992ec8c5c707e6019046ae28897af7575d075ce7cdeefac8e40e67ca730cf6509dd948ad

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  459B

                  MD5

                  7faaa3b45e9bc3a1b47d5fd6ebbba161

                  SHA1

                  482cd7d4a9206b1398c90e3eb95d4a8646d73fcc

                  SHA256

                  6a36e2d030b0bf96351c4d6ec012690d8e01bb4f010f72ab0b400dbcb2534d07

                  SHA512

                  cadf862d842db38580080a11e44faf6d80e0975438786b786c5f0d7326d1a70b6f93ee12abf9cfe6de52150e9606f31350ac02360a8aaa3432f61963a097c64a

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  4KB

                  MD5

                  bab8a9d1340bdd6b1f49d94343ef882d

                  SHA1

                  4f8c5df5f841e03cf5f9e926e807a60f250d4f17

                  SHA256

                  09797da299d96861f6172f43f1be5bab72461ba09d3bb0033f3e2438972c08fe

                  SHA512

                  07b8f3cc662f7231e3923ef411a500c6ba9e1aae04e8b0c938b67e5d77915b43ac0acca86e22f6e9f5ba1bbf2c9031b78c35d9e0530b1406ed3fe65b1af72254

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  f30e5d89c7e38cfce978ea0a921c294f

                  SHA1

                  6312a502c1ede20c63faa0e778f71b041a691172

                  SHA256

                  24bf6bdd0e22973183c5045a61bd4555a8f1e3785269b45b2c9ec4cf1dc6dbc1

                  SHA512

                  c409735a79cae245ebf90a75e7508650c7735460a2be56012d7b5e8e3d4df8ad18cdaa79a49b451be1d39933f804e72c1a3f468568c48c48d70a1a56534823da

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                  Filesize

                  24KB

                  MD5

                  d53ac35ab3976e67caeed75c4d44ffc1

                  SHA1

                  c139ab66d75dc06f98ada34b5baf4d5693266176

                  SHA256

                  647867c7236bcb78b7d585b476d82a101a077fac43c78dc59e612253fbf69437

                  SHA512

                  391355c71734ded913239a6db10a3202087e756bccc8e29411108f21b3f2460d9a9c606619aadd785285be70eddcf61ef9519441cd387cd3823c1399a6967cc2

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT

                  Filesize

                  16B

                  MD5

                  46295cac801e5d4857d09837238a6394

                  SHA1

                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                  SHA256

                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                  SHA512

                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                  Filesize

                  41B

                  MD5

                  5af87dfd673ba2115e2fcf5cfdb727ab

                  SHA1

                  d5b5bbf396dc291274584ef71f444f420b6056f1

                  SHA256

                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                  SHA512

                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_1

                  Filesize

                  264KB

                  MD5

                  f50f89a0a91564d0b8a211f8921aa7de

                  SHA1

                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                  SHA256

                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                  SHA512

                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  9KB

                  MD5

                  6adeeaaaa980645ac37460f552659e53

                  SHA1

                  d75e7c505ff2cdc15fe2e274a3d22910cf2991b9

                  SHA256

                  46d94ac35502ed3bd6170e3c8010b03c4cbbe5625c2aeeb342f832a81eb41b14

                  SHA512

                  737e87d1e6e1e2a73eff402bcb1a5771b3477783aeff430a6fa376f095f882e96fe449e5453d337d505b8f8218b245566e9e2838c36f7cd6f5bb1aeba3166933

                • C:\Users\Admin\AppData\Local\Temp\Evon\bin\theme.evon

                  Filesize

                  129B

                  MD5

                  d6c7f9316b8b354ae41d240148df8a50

                  SHA1

                  e5964023d350b4c361e0e7b79b3e4ca2ec2b243f

                  SHA256

                  8ac1144f9077bc7c60437a9998ce03fce98b539f08723f33ad89da410c42004f

                  SHA512

                  3c975797f72754e3d6aa75296dc9710d55be67718ce4e76724bef58e92c7f1ac6645934430574c62538533027003e72f523ec658527452f0e469c12d1336fd76

                • memory/1320-151-0x000000000B000000-0x000000000B186000-memory.dmp

                  Filesize

                  1.5MB

                • memory/1320-339-0x000000000FCC0000-0x00000000101EC000-memory.dmp

                  Filesize

                  5.2MB

                • memory/1320-201-0x0000000005920000-0x0000000005932000-memory.dmp

                  Filesize

                  72KB

                • memory/1320-183-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB

                • memory/1320-184-0x000000000E7F0000-0x000000000E7F8000-memory.dmp

                  Filesize

                  32KB

                • memory/1320-172-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB

                • memory/1320-138-0x00000000089B0000-0x00000000089BA000-memory.dmp

                  Filesize

                  40KB

                • memory/1320-137-0x00000000089C0000-0x00000000089CA000-memory.dmp

                  Filesize

                  40KB

                • memory/1320-133-0x0000000000500000-0x0000000000B64000-memory.dmp

                  Filesize

                  6.4MB

                • memory/1320-136-0x0000000008670000-0x00000000087AE000-memory.dmp

                  Filesize

                  1.2MB

                • memory/1320-150-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB

                • memory/1320-148-0x00000000094F0000-0x000000000950E000-memory.dmp

                  Filesize

                  120KB

                • memory/1320-145-0x00000000094A0000-0x00000000094C2000-memory.dmp

                  Filesize

                  136KB

                • memory/1320-173-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB

                • memory/1320-144-0x0000000008C80000-0x0000000008C8E000-memory.dmp

                  Filesize

                  56KB

                • memory/1320-434-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB

                • memory/1320-143-0x0000000009330000-0x0000000009368000-memory.dmp

                  Filesize

                  224KB

                • memory/1320-135-0x00000000084B0000-0x0000000008526000-memory.dmp

                  Filesize

                  472KB

                • memory/1320-134-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB

                • memory/1320-142-0x0000000008A80000-0x0000000008A88000-memory.dmp

                  Filesize

                  32KB

                • memory/1320-141-0x00000000093B0000-0x000000000946A000-memory.dmp

                  Filesize

                  744KB

                • memory/1320-139-0x0000000008A90000-0x0000000008B22000-memory.dmp

                  Filesize

                  584KB

                • memory/1320-572-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB

                • memory/1320-573-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB

                • memory/1320-574-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB

                • memory/1320-575-0x000000000FA60000-0x000000000FAB0000-memory.dmp

                  Filesize

                  320KB

                • memory/1320-576-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB

                • memory/1320-577-0x0000000005740000-0x0000000005750000-memory.dmp

                  Filesize

                  64KB