Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/09/2023, 18:48

General

  • Target

    http://vivaciouswiltedexecutable.yaxisis381.repl.co/

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://vivaciouswiltedexecutable.yaxisis381.repl.co/"
    1⤵
      PID:3780
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1128
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4392
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:392
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3468
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2112
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:1284
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4440
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:292

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0G1F2NWK\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1AYXC15Z\jquery(1)[1].css

      Filesize

      54KB

      MD5

      49e0c65587fb9aba9ccf63e17957e004

      SHA1

      2b5a571c3367637e5888790a31689928e226b47a

      SHA256

      8bf9647a806d28e3ea111560d259c6567f3a9bb1ce29c5a64062438c6011e708

      SHA512

      9be31b080ac6da2656439c290562dbe572dd8907d16c86a1803f4cc09de06e77d8523205f6d91cd0f159a0e52f76e9bec794048be0ccb5eb5bc89cf8f75e80c9

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\7V7TX0YF\dropkickddl(1)[1].css

      Filesize

      9KB

      MD5

      340d21702420ab2caa53a79a5d8b1381

      SHA1

      72bed33955cd8025c1c7b28f87ad126e06b04b66

      SHA256

      d736f8707ba3b56acf10912b26ef228320976cbbd94ad15f6dd02e5bc3caa831

      SHA512

      987cdbcb2bc3f87d75336f72d98b1e14ccfecbeb1a334650c50960fc0a022745c7b51c35eacf2ca08f41ce644d6e5faa0dc9288d25713e2acde6b2b234c5f048

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\OYURHXNP\locot3x[1].css

      Filesize

      143KB

      MD5

      b19ebdac34acf3c97cce3d788251abf6

      SHA1

      e6418c69d6b905378bde94ecd05fda15fd93cf69

      SHA256

      dea7e4097cc9c28c76c93b702664121075a80fc0eb4f4580766807657782c378

      SHA512

      53fda1805ae4a3d208a77c66ad42c8b1d2ae9b532300696196b7ca4237bb9c3b4099f5f8c06d181128a8fb225315a87f48cde32d9a3746c82f03a1e84a629e09

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\009E2MWD\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1AYXC15Z\OpenSans[1].woff

      Filesize

      65KB

      MD5

      90327f5ac43d0fbc708f3653ffc0a043

      SHA1

      6338efd317dcb9320b25a3dfa16e3a4f08329ca0

      SHA256

      fe640f52967c9e03a524ce5e21369203dca41289d748d9f36d93c911cd517eaf

      SHA512

      7e36e15a156cb08a8c2996d17089855397f91d415af5e6977bd5664780d6a680743bcae64780c0b9ace31cded5ba290eea83378f5ab8395be29b70029ba188d1

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1AYXC15Z\fondito[1].jpg

      Filesize

      35KB

      MD5

      5c545e7ab1fe416b888fe2dbe7da64d5

      SHA1

      f21311d51bf52b8704fbdd505e0194f868e9313d

      SHA256

      4db0b654f3d83e85b669c60ae37ad734cde96c66c75397034f755512f945e508

      SHA512

      d8ebae7c3a54da6b08ab8c80bffbc64d82cafe0c155205faecfafdc0fae7cc03d3faf3b0366bca58a011ccc6ca959876f827a02eff9f52838d5ec5f818fc6585

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\YCNYSHBI\logoprincipal[1].png

      Filesize

      14KB

      MD5

      ec370b67004962b18471b2c069888aeb

      SHA1

      214adfa0619268bbd1749134dfecc68df41402a4

      SHA256

      b57ab0866f889d8aad9959f6fdf867c1672de5e89d7dd37c8bcfb15124707730

      SHA512

      1264224be4010ead5d1a914e9cd550fb64b52615c5e48f6ca6fa91f7c91071ce1c13c7e8ffbb3ea1c5b0bec6dc9c9e1032b8008f7e4d39bc847a5836af56fb0e

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      60fe01df86be2e5331b0cdbe86165686

      SHA1

      2a79f9713c3f192862ff80508062e64e8e0b29bd

      SHA256

      c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

      SHA512

      ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\3914B80A43173C01F21450E962782F7D

      Filesize

      503B

      MD5

      6dc499d0821fb5b3aa388b91758358b4

      SHA1

      8e825fbf350dbe8f36837d903c32f215827a0bef

      SHA256

      b121db7d08af04d37fe9210453023583709d18b85298ede684b3a0543d6a62b2

      SHA512

      aa8c63739577bfef2c704540c23eb28927f4c41536e3b3dc4f9ac16b90e75407a1f378d72dcbb0438729e03a75fb2bc3160c29738a718ebe0d831e788f7d008e

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      5f391a9f910c7b52a4e3e68f59c1d2a9

      SHA1

      53899eae13616699f5b65a6c16030f48ce9077fe

      SHA256

      749805a073a2a7aaef170937d88d2d32ccd7a418b983009cf68a678043cd8d4d

      SHA512

      c1584740ff480ab25a564e63e7e061a90ef5b89e0b9c1ca43ff67ff0254dc8a10ef3f6c8064495e880791a2195235ffc0782f6041fa5c626014d40d2015e937e

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\3914B80A43173C01F21450E962782F7D

      Filesize

      548B

      MD5

      eb623b0c32b102a913379798cf511dc8

      SHA1

      941fff4eb771e0db77260d802405581748233a2a

      SHA256

      28f1abc84a46643b5380b9db2bc979edce72e0ead55e235821d8c6a44979e2f7

      SHA512

      5dc6c70603000185918282bdaf767dfd12507a30da37377464516bd891152fad4ca400aa88b513dd03cc831b3a501dd1b99ec79c6a38cb45068714a57d2bdc76

    • memory/1128-35-0x000001E408590000-0x000001E408592000-memory.dmp

      Filesize

      8KB

    • memory/1128-226-0x000001E40B5B0000-0x000001E40B5B1000-memory.dmp

      Filesize

      4KB

    • memory/1128-227-0x000001E40B5C0000-0x000001E40B5C1000-memory.dmp

      Filesize

      4KB

    • memory/1128-16-0x000001E403740000-0x000001E403750000-memory.dmp

      Filesize

      64KB

    • memory/1128-0-0x000001E402E20000-0x000001E402E30000-memory.dmp

      Filesize

      64KB

    • memory/2112-99-0x00000221DAAF0000-0x00000221DAAF2000-memory.dmp

      Filesize

      8KB

    • memory/2112-97-0x00000221DAAE0000-0x00000221DAAE2000-memory.dmp

      Filesize

      8KB

    • memory/2112-95-0x00000221DAAC0000-0x00000221DAAC2000-memory.dmp

      Filesize

      8KB

    • memory/2112-57-0x00000221C9550000-0x00000221C9552000-memory.dmp

      Filesize

      8KB

    • memory/2112-114-0x00000221DB800000-0x00000221DB802000-memory.dmp

      Filesize

      8KB

    • memory/2112-60-0x00000221C9580000-0x00000221C9582000-memory.dmp

      Filesize

      8KB

    • memory/2112-101-0x00000221DAB10000-0x00000221DAB12000-memory.dmp

      Filesize

      8KB

    • memory/2112-62-0x00000221C95A0000-0x00000221C95A2000-memory.dmp

      Filesize

      8KB

    • memory/4440-210-0x0000014BAE040000-0x0000014BAE042000-memory.dmp

      Filesize

      8KB

    • memory/4440-251-0x0000014BAC9C0000-0x0000014BAC9C2000-memory.dmp

      Filesize

      8KB