Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    11s
  • max time network
    18s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2023, 01:01

General

  • Target

    https://t.sidekickopen72.com/Ctc/ZQ+23284/cjKh804/Jks8VMXNW69v02T6lZ3nfW8s_nw_4pn3sGN2zkpvnKm8hQW3mpVPJ33L6K3W2C4DRh3X6V-TW6hgBSC5R-9ZZW3sZtGN6Cw1VWW2fgz9Q3SjHzfW3d8KDs2vQjflW3H_r6z6kL38bVpFbcM4jkJNZW8TzgPL7y4LzNN8LmpZYPbh1VW4mcbbQ60rHW7N1hhGcWgRv3KW6qtV_w409X1mW3phty67bLH9pW5DdNB34qdNwGW3PHTkN6NtR-XW2FcsNv8CvfvkW9fk0HK2QLLsgW7GxcM73RbdktW2JBTvX96YcW4W3d2fyj2HJClwW2dFRN07v6WFBW3154ZD4C7HY9W4n9kMh8jq0JZVzgTyN4zZcxMN3kdZPQ6mvChW6v-_JX5g8fptW3rK9fL3hDltHVn3_Hx8zNqgYW1NxSMr1d6HcZN3-pP2C2qj2lN7mJ5HB3yjfKVCBNcf2TpvdLN4cgWyw4ksLqN887qwFgF8mpW4-c6r387n0b6VHjt7041_-nvW1k9bRJ2n-L9tW1zckH03tj8wtW93SJ-03Zb8vRW4FXZFz1LttYpW8FNZ9D3smqglW1Z2v8_2ptKGvN2Mj5ZQy1vvVW1SD5Lq1PgNH_W28SZ4D3M2Rh2N8rTYgCYRlT8N8kJjsBT64gZW5YM2WQ1KKYlwN4WZSt4r_fmqVH0G4H8dThg1W2q6VVZ8snZ2mVh_RV18stlVHW3zKq-k8hfdZPW7Dyt6p11BcvQW9hv_3g2vSk5GN9btfLYGZYz_W5jD3HZ2xm05nW85wLxZ27-XpYW5VG5Pk1BRRlmW6gPv4h1J3D91N6XFhXvN1Y9ZW3bRCvm326WsLW8tBk7h12N605W6yXvT15Jbv25Vz0CWs1-FSN2f6Yt-Px04

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.sidekickopen72.com/Ctc/ZQ+23284/cjKh804/Jks8VMXNW69v02T6lZ3nfW8s_nw_4pn3sGN2zkpvnKm8hQW3mpVPJ33L6K3W2C4DRh3X6V-TW6hgBSC5R-9ZZW3sZtGN6Cw1VWW2fgz9Q3SjHzfW3d8KDs2vQjflW3H_r6z6kL38bVpFbcM4jkJNZW8TzgPL7y4LzNN8LmpZYPbh1VW4mcbbQ60rHW7N1hhGcWgRv3KW6qtV_w409X1mW3phty67bLH9pW5DdNB34qdNwGW3PHTkN6NtR-XW2FcsNv8CvfvkW9fk0HK2QLLsgW7GxcM73RbdktW2JBTvX96YcW4W3d2fyj2HJClwW2dFRN07v6WFBW3154ZD4C7HY9W4n9kMh8jq0JZVzgTyN4zZcxMN3kdZPQ6mvChW6v-_JX5g8fptW3rK9fL3hDltHVn3_Hx8zNqgYW1NxSMr1d6HcZN3-pP2C2qj2lN7mJ5HB3yjfKVCBNcf2TpvdLN4cgWyw4ksLqN887qwFgF8mpW4-c6r387n0b6VHjt7041_-nvW1k9bRJ2n-L9tW1zckH03tj8wtW93SJ-03Zb8vRW4FXZFz1LttYpW8FNZ9D3smqglW1Z2v8_2ptKGvN2Mj5ZQy1vvVW1SD5Lq1PgNH_W28SZ4D3M2Rh2N8rTYgCYRlT8N8kJjsBT64gZW5YM2WQ1KKYlwN4WZSt4r_fmqVH0G4H8dThg1W2q6VVZ8snZ2mVh_RV18stlVHW3zKq-k8hfdZPW7Dyt6p11BcvQW9hv_3g2vSk5GN9btfLYGZYz_W5jD3HZ2xm05nW85wLxZ27-XpYW5VG5Pk1BRRlmW6gPv4h1J3D91N6XFhXvN1Y9ZW3bRCvm326WsLW8tBk7h12N605W6yXvT15Jbv25Vz0CWs1-FSN2f6Yt-Px04
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffa12d146f8,0x7ffa12d14708,0x7ffa12d14718
      2⤵
        PID:2500
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,14230244490257749776,17715717244190159360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3908
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,14230244490257749776,17715717244190159360,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:2
        2⤵
          PID:2236
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,14230244490257749776,17715717244190159360,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:8
          2⤵
            PID:3464
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14230244490257749776,17715717244190159360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
            2⤵
              PID:3132
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14230244490257749776,17715717244190159360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
              2⤵
                PID:3504
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14230244490257749776,17715717244190159360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:1
                2⤵
                  PID:1152
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,14230244490257749776,17715717244190159360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:8
                  2⤵
                    PID:4324
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,14230244490257749776,17715717244190159360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4556
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14230244490257749776,17715717244190159360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:1
                    2⤵
                      PID:3748
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14230244490257749776,17715717244190159360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                      2⤵
                        PID:1552
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:4584
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:4784

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          aed593b08b94f34dd8f68fd369652ac2

                          SHA1

                          3ce2a17e426e09c2fd9a8d2ab191fe29248f2d95

                          SHA256

                          5c0cdd5dc1bccf7e3ffa8568fdd2fe35f3edc85832f3d11331aced965aaeeba7

                          SHA512

                          16b34c29d8ea3793f7d4491847d2fecae2c6c9d7b7b1ec16d1367828d0a4da4cdbf912c2040bc0ca98ac32cd701355ddd16b4865629d51bae2527e1a05411137

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                          Filesize

                          111B

                          MD5

                          285252a2f6327d41eab203dc2f402c67

                          SHA1

                          acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                          SHA256

                          5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                          SHA512

                          11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          2ca530fcc2e1edc3695994fdc8d66d4b

                          SHA1

                          3dea0bd51affb005c90eaaabe7bdc5a78129faa8

                          SHA256

                          6c41f6a74d5528e670ba5b0649b0149e9c1ff0b25282db0dd5d0cd4e1a71c92c

                          SHA512

                          5e26629bcec82aee67a09ad7089a9da63e9cad476be29319089528874cb87f860fa992b6bc0cb3e4f1597ba2088d4d380f058338277bb0961a1b746cac55a3af

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          ca3e80838d3eec6b0b6941cc605c5971

                          SHA1

                          6bb761c661b8a95c64206795a05ab77238c012f5

                          SHA256

                          f95e968bfcb0f2f4f5de8b02c3356f8e5d7bffb863b02778a622e59ce013faa8

                          SHA512

                          9aae3dae9cefde75948f4a444ba529e56c504f24f7e12a5844f5124a35807c946ea410a08af1ad6b2b7f1a02ea29f629cedbcfecb23e62d14ce1f84336fa5b89

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                          Filesize

                          24KB

                          MD5

                          e2565e589c9c038c551766400aefc665

                          SHA1

                          77893bb0d295c2737e31a3f539572367c946ab27

                          SHA256

                          172017da29bce2bfe0c8b4577a9b8e7a97a0585fd85697f51261f39b28877e80

                          SHA512

                          5a33ce3d048f2443c5d1aee3922693decc19c4d172aff0b059b31af3b56aa5e413902f9a9634e5ee874b046ae63a0531985b0361467b62e977dcff7fc9913c4d

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          6752a1d65b201c13b62ea44016eb221f

                          SHA1

                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                          SHA256

                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                          SHA512

                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          10KB

                          MD5

                          f5f60bc170b7a5f3a31d9b4eec653ef8

                          SHA1

                          6d90d20f64f84e855611158e94e7b019d35ab8b9

                          SHA256

                          add628a8dc64998eeeb472db631b5497236b6ac2b6b14eb1a6a079c4d2b390c0

                          SHA512

                          c3cd379e6b3143460b98d91965be358da19e97cf53d8c0a23a7192397af55bba62df6c805b9be1888f4697dd04af119e2d431745ceb1f1fc0f0a79df36f93d44