Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/10/2023, 07:27

General

  • Target

    https://employeeinsight.uk.mercer.com/QATA09/bcda2339-75f3-4f78-854d-f71e443db37c/?0qp4er86/a

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://employeeinsight.uk.mercer.com/QATA09/bcda2339-75f3-4f78-854d-f71e443db37c/?0qp4er86/a"
    1⤵
      PID:4460
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4060
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2872
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4836
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3784
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1400
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4340
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:668
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3364

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6IJ7L0EZ\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\NDWOOFMR\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\SFMMVRUP\favicon[1].ico

      Filesize

      15KB

      MD5

      f1c329563843a3e4c54f25429b1605c4

      SHA1

      98fe3ba3c42e08fcc0b751ff8bf1ad71fa969f49

      SHA256

      d153068b0c26af8ffdf12bfb3aea4c9e4cf7107e5aa61fb6c4dca0a0ff7ddc3d

      SHA512

      fe3750a55042db1f1ea96fbac9a23f4d44e1450eedcd825798c5f2b07ee0be302b4c95e42965b3ca6843f47b1d6265e2d0737b619c80bbabde0641a7b54532fd

    • memory/1400-89-0x00000164E4EB0000-0x00000164E4EB2000-memory.dmp

      Filesize

      8KB

    • memory/1400-86-0x00000164E4E80000-0x00000164E4E82000-memory.dmp

      Filesize

      8KB

    • memory/1400-91-0x00000164E50D0000-0x00000164E50D2000-memory.dmp

      Filesize

      8KB

    • memory/1400-93-0x00000164E50F0000-0x00000164E50F2000-memory.dmp

      Filesize

      8KB

    • memory/1400-95-0x00000164E5630000-0x00000164E5632000-memory.dmp

      Filesize

      8KB

    • memory/1400-97-0x00000164E56F0000-0x00000164E56F2000-memory.dmp

      Filesize

      8KB

    • memory/1400-99-0x00000164E5810000-0x00000164E5812000-memory.dmp

      Filesize

      8KB

    • memory/1400-118-0x00000164D42D0000-0x00000164D42E4000-memory.dmp

      Filesize

      80KB

    • memory/2872-136-0x000002166A130000-0x000002166A144000-memory.dmp

      Filesize

      80KB

    • memory/4060-107-0x000001EE60070000-0x000001EE60071000-memory.dmp

      Filesize

      4KB

    • memory/4060-117-0x000001EE60000000-0x000001EE60014000-memory.dmp

      Filesize

      80KB

    • memory/4060-108-0x000001EE60080000-0x000001EE60081000-memory.dmp

      Filesize

      4KB

    • memory/4060-35-0x000001EE58CF0000-0x000001EE58CF2000-memory.dmp

      Filesize

      8KB

    • memory/4060-0-0x000001EE59920000-0x000001EE59930000-memory.dmp

      Filesize

      64KB

    • memory/4060-16-0x000001EE5A100000-0x000001EE5A110000-memory.dmp

      Filesize

      64KB