Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    4s
  • max time network
    11s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/10/2023, 19:09

General

  • Target

    https://www.diningoutnyc.info

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://www.diningoutnyc.info"
    1⤵
      PID:364
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3812
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4948
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3656
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1796
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2332
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:4556

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\I839GHG0\www.diningoutnyc[1].xml

        Filesize

        13B

        MD5

        c1ddea3ef6bbef3e7060a1a9ad89e4c5

        SHA1

        35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

        SHA256

        b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

        SHA512

        6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\VD1DLQQ9\favicon[1].ico

        Filesize

        6KB

        MD5

        50987dc9e8a53d99fcd03dd9fcb021f0

        SHA1

        d353914a016dc5950231b2976d038171bb6b7a43

        SHA256

        c9f933083171313350ca1f75e0e9f3e602969b72ebf6dc4f7c3a6daa79e09290

        SHA512

        a0853f68c905d726bab59890420b9e1ddee97492b2856d219c980e48d110377065f1dec15bab6577b5323ee086b002aa014fb15657eff052e5eccffd4da328a8

      • memory/2332-208-0x0000014078150000-0x0000014078152000-memory.dmp

        Filesize

        8KB

      • memory/2332-212-0x0000014078330000-0x0000014078332000-memory.dmp

        Filesize

        8KB

      • memory/2332-61-0x0000014066420000-0x0000014066422000-memory.dmp

        Filesize

        8KB

      • memory/2332-64-0x0000014066440000-0x0000014066442000-memory.dmp

        Filesize

        8KB

      • memory/2332-182-0x000001407A760000-0x000001407A860000-memory.dmp

        Filesize

        1024KB

      • memory/2332-235-0x0000014078AF0000-0x0000014078AF2000-memory.dmp

        Filesize

        8KB

      • memory/2332-231-0x00000140788D0000-0x00000140788D2000-memory.dmp

        Filesize

        8KB

      • memory/2332-57-0x00000140663D0000-0x00000140663D2000-memory.dmp

        Filesize

        8KB

      • memory/2332-216-0x00000140783F0000-0x00000140783F2000-memory.dmp

        Filesize

        8KB

      • memory/2332-219-0x0000014078430000-0x0000014078432000-memory.dmp

        Filesize

        8KB

      • memory/2332-223-0x0000014078790000-0x0000014078792000-memory.dmp

        Filesize

        8KB

      • memory/3812-0-0x000001D131820000-0x000001D131830000-memory.dmp

        Filesize

        64KB

      • memory/3812-35-0x000001D130BB0000-0x000001D130BB2000-memory.dmp

        Filesize

        8KB

      • memory/3812-282-0x000001D137EB0000-0x000001D137EB1000-memory.dmp

        Filesize

        4KB

      • memory/3812-283-0x000001D137EC0000-0x000001D137EC1000-memory.dmp

        Filesize

        4KB

      • memory/3812-16-0x000001D131A20000-0x000001D131A30000-memory.dmp

        Filesize

        64KB