Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    300s
  • max time network
    259s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/11/2023, 10:00

General

  • Target

    http://ddns.net

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://ddns.net"
    1⤵
      PID:4580
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:96
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3852
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3412
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3140
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3636
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:628
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4516
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:1372

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SU6W8964\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\EIY9LYEK\www.youtube[1].xml

      Filesize

      229B

      MD5

      ff30d78c8146263ee5d0b2b3012eb6b6

      SHA1

      a4c0a797d164f0ef26fe1562a3151a6b6c62f472

      SHA256

      6d449a86ea8072763edfcb380fc69d6425101b54f4376ea223214984a48faa1e

      SHA512

      f197e34e8674cc127e18570a997dfb5c773eea14403573c2c64b904c6f9fbc29e2a1e7cbc83f595c72e525a83bf064d26fa810b2cd27a1a6d0bfd575a5b8149d

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\EIY9LYEK\www.youtube[1].xml

      Filesize

      25KB

      MD5

      d1af4925a0e61e65d549bafe6ba367f7

      SHA1

      b2169777d821b404cee714f9cf8d80f468116fcd

      SHA256

      dd4d3396a43aea75f22e1fa28ea8e61584d0798b06ae99fa38b5745952361c14

      SHA512

      87a042e4b1ca0847ae730b3979663d23fbbad2be7853316b40396fb63e06a58f07590d494ad6bc824b9f18b0533861fbc68146f87c8ffc7ae2e02dee8d5eb196

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\LE32WV0Y\freeddns.noip[1].xml

      Filesize

      415B

      MD5

      57cf47091d25e289a087a14f76f3a4d0

      SHA1

      9b91ccb1997c8a38faabc28a9a0cc6911c9454c5

      SHA256

      43202e772dda57ceeb80ed5faa5b9202aaf406f8a9ba637f77617cd82f4e276f

      SHA512

      390dbea4bf5d49ee7e24bd282dae8cb8038284f4fc41c732a86ec0b257b0125d0eaeab5e3864a884ef0c6627c8ac718933fffac694f776f126e22e4e37fc408b

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\GQ4DKG02\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\HZZYLQA1\favicon[1].ico

      Filesize

      1KB

      MD5

      6ec21049fa5c9b3f21aa1e06bde3b229

      SHA1

      0f3ea2df9974fd8bcd2664d1c8551419a51fc9c6

      SHA256

      40337540c3273cb2e9f9f54776520566e60ec6ec826203517b09c88f08e1e846

      SHA512

      9db4519fb34a7da2fd1753e79a486e589e8f0648c02ac3f8abbb4e782ef537625bdf30436bbe4b9abad64afcebad0aef2a5eb34a849787af06fac55d9a76bef2

    • memory/96-141-0x0000019F70460000-0x0000019F70461000-memory.dmp

      Filesize

      4KB

    • memory/96-16-0x0000019F6A020000-0x0000019F6A030000-memory.dmp

      Filesize

      64KB

    • memory/96-35-0x0000019F673D0000-0x0000019F673D2000-memory.dmp

      Filesize

      8KB

    • memory/96-0-0x0000019F69E20000-0x0000019F69E30000-memory.dmp

      Filesize

      64KB

    • memory/96-140-0x0000019F70450000-0x0000019F70451000-memory.dmp

      Filesize

      4KB

    • memory/3636-367-0x0000024DF7F20000-0x0000024DF8020000-memory.dmp

      Filesize

      1024KB

    • memory/3636-452-0x0000024DF07F0000-0x0000024DF0800000-memory.dmp

      Filesize

      64KB

    • memory/3636-149-0x0000024DF1D20000-0x0000024DF1D40000-memory.dmp

      Filesize

      128KB

    • memory/3636-169-0x0000024DF5440000-0x0000024DF5460000-memory.dmp

      Filesize

      128KB

    • memory/3636-133-0x0000024DF1270000-0x0000024DF1272000-memory.dmp

      Filesize

      8KB

    • memory/3636-204-0x0000024DF6010000-0x0000024DF6110000-memory.dmp

      Filesize

      1024KB

    • memory/3636-130-0x0000024DF0790000-0x0000024DF0792000-memory.dmp

      Filesize

      8KB

    • memory/3636-121-0x0000024DF0760000-0x0000024DF0762000-memory.dmp

      Filesize

      8KB

    • memory/3636-375-0x0000024DF5CD0000-0x0000024DF5CD2000-memory.dmp

      Filesize

      8KB

    • memory/3636-418-0x0000024DF8CA0000-0x0000024DF8DA0000-memory.dmp

      Filesize

      1024KB

    • memory/3636-428-0x0000024DF9A60000-0x0000024DF9B60000-memory.dmp

      Filesize

      1024KB

    • memory/3636-443-0x0000024DF3C90000-0x0000024DF3C92000-memory.dmp

      Filesize

      8KB

    • memory/3636-448-0x0000024DF3CB0000-0x0000024DF3CB2000-memory.dmp

      Filesize

      8KB

    • memory/3636-137-0x0000024DF42B0000-0x0000024DF42B2000-memory.dmp

      Filesize

      8KB

    • memory/3636-453-0x0000024DF07F0000-0x0000024DF0800000-memory.dmp

      Filesize

      64KB

    • memory/3636-451-0x0000024DF3CD0000-0x0000024DF3CD2000-memory.dmp

      Filesize

      8KB

    • memory/3636-450-0x0000024DF07F0000-0x0000024DF0800000-memory.dmp

      Filesize

      64KB

    • memory/3636-454-0x0000024DF3CE0000-0x0000024DF3CE2000-memory.dmp

      Filesize

      8KB

    • memory/3636-455-0x0000024DF07F0000-0x0000024DF0800000-memory.dmp

      Filesize

      64KB

    • memory/3636-458-0x0000024DF07F0000-0x0000024DF0800000-memory.dmp

      Filesize

      64KB

    • memory/3636-457-0x0000024DF3D00000-0x0000024DF3D02000-memory.dmp

      Filesize

      8KB

    • memory/3636-456-0x0000024DF07F0000-0x0000024DF0800000-memory.dmp

      Filesize

      64KB

    • memory/3636-459-0x0000024DF07F0000-0x0000024DF0800000-memory.dmp

      Filesize

      64KB

    • memory/3636-461-0x0000024DF07F0000-0x0000024DF0800000-memory.dmp

      Filesize

      64KB

    • memory/3636-460-0x0000024DF3D20000-0x0000024DF3D22000-memory.dmp

      Filesize

      8KB

    • memory/3636-116-0x0000024DF3E90000-0x0000024DF3E92000-memory.dmp

      Filesize

      8KB

    • memory/3636-107-0x0000024DF3E50000-0x0000024DF3E52000-memory.dmp

      Filesize

      8KB

    • memory/3636-93-0x0000024DF3E30000-0x0000024DF3E32000-memory.dmp

      Filesize

      8KB