Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    270s
  • max time network
    253s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/09/2023, 09:35

General

  • Target

    http://client.handyhost.ru

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://client.handyhost.ru"
    1⤵
      PID:4164
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1800
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:5096
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4940
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:236
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4996
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2720
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2492
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2156

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2RZQZMR9\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\PRHCR11H\recaptcha__en[1].js

      Filesize

      452KB

      MD5

      b9fa78b438652d549f20ad262bffa843

      SHA1

      ac85e9636a3cf1c7a935ad2b1a7eeefcf2799feb

      SHA256

      97ac5eba21b58460149454c9115b09ed01937650647fdcfe405d5d61d85b72e5

      SHA512

      d12828a7592e4ce74cb37caa8836efafc9dd4bd17fb2614dd71a9f01557ba0936d74f77501faf1448ead1895210f384022c7e567c50fdac6a1d1656b58d54c08

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\DKS42RNY\client.handyhost[1].xml

      Filesize

      112B

      MD5

      45205ed35dd073ff0007acc7fd3d9320

      SHA1

      b634a99d4813a6c6900a10b430eee18ad553f3b7

      SHA256

      3fe3ac5eef2cd27ecc13e0d1bda7464eff97d037a96065a86d2fbbb4b06f6f20

      SHA512

      00d7f87b8f51e889f927777fca441ebd32d2987905b2951fcf551bcc986f72b9292f0fa3327f016d59bccb235f2e5929e31e0fedab5eccaf816331c39fea5868

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\DKS42RNY\client.handyhost[1].xml

      Filesize

      27KB

      MD5

      626f540b7dc603e613f05e4689bb3008

      SHA1

      1207c8b8951d3b89601c9782cff343d2c371ee7e

      SHA256

      185126c4c7c17ed995eae45ede34a41665cba63d5d7181a1752ad0a6a8bc5fd5

      SHA512

      47a0a78bf6f5c24cd6af57147c7d839ba279896e13b837a3821045e694f17c66896a3124f43759fcccfb84b9202a564652e07230d7b9882d9b0fbc2e8b4579a2

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\BCU2VTTT\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\GLGFS7OZ\favicon[1].ico

      Filesize

      1KB

      MD5

      0856fc45c3d9e124989aa534a3de3c46

      SHA1

      7bb928043ea8677f0d9f71a0b10b5428272f692e

      SHA256

      d3d164d203d35d0eeeb2cda990b20d502cfec40e10c9f7df2dec1d17b08ca447

      SHA512

      ccc3abb63fd569df96cc426e13d0e4545f58ba119fb949fd527e98086c109d854c475b583095a08068abf0b48ddf4b2764b89d35813ae1eb46854dd2220a9ad7

    • memory/1800-16-0x0000016AB8500000-0x0000016AB8510000-memory.dmp

      Filesize

      64KB

    • memory/1800-35-0x0000016AB7EF0000-0x0000016AB7EF2000-memory.dmp

      Filesize

      8KB

    • memory/1800-0-0x0000016AB7D20000-0x0000016AB7D30000-memory.dmp

      Filesize

      64KB

    • memory/1800-234-0x0000016ABE490000-0x0000016ABE491000-memory.dmp

      Filesize

      4KB

    • memory/1800-237-0x0000016ABE4A0000-0x0000016ABE4A1000-memory.dmp

      Filesize

      4KB

    • memory/4996-96-0x000001AF33A40000-0x000001AF33A60000-memory.dmp

      Filesize

      128KB

    • memory/4996-220-0x000001AF36800000-0x000001AF36900000-memory.dmp

      Filesize

      1024KB

    • memory/4996-134-0x000001AF34DF0000-0x000001AF34DF2000-memory.dmp

      Filesize

      8KB

    • memory/4996-141-0x000001AF35370000-0x000001AF35372000-memory.dmp

      Filesize

      8KB

    • memory/4996-144-0x000001AF353B0000-0x000001AF353B2000-memory.dmp

      Filesize

      8KB

    • memory/4996-148-0x000001AF353D0000-0x000001AF353D2000-memory.dmp

      Filesize

      8KB

    • memory/4996-157-0x000001AF23200000-0x000001AF23300000-memory.dmp

      Filesize

      1024KB

    • memory/4996-160-0x000001AF34860000-0x000001AF34960000-memory.dmp

      Filesize

      1024KB

    • memory/4996-120-0x000001AF353F0000-0x000001AF353F2000-memory.dmp

      Filesize

      8KB

    • memory/4996-128-0x000001AF34D60000-0x000001AF34D62000-memory.dmp

      Filesize

      8KB

    • memory/4996-109-0x000001AF34B00000-0x000001AF34B02000-memory.dmp

      Filesize

      8KB

    • memory/4996-106-0x000001AF34730000-0x000001AF34732000-memory.dmp

      Filesize

      8KB

    • memory/4996-97-0x000001AF34270000-0x000001AF34272000-memory.dmp

      Filesize

      8KB

    • memory/4996-95-0x000001AF33A40000-0x000001AF33A60000-memory.dmp

      Filesize

      128KB

    • memory/4996-290-0x000001AF34E40000-0x000001AF34E42000-memory.dmp

      Filesize

      8KB

    • memory/4996-91-0x000001AF34250000-0x000001AF34252000-memory.dmp

      Filesize

      8KB

    • memory/4996-92-0x000001AF339C0000-0x000001AF339E0000-memory.dmp

      Filesize

      128KB