Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/11/2023, 00:06

231127-adzdksdb7s 6

27/11/2023, 00:02

231127-abv85sdb5v 6

Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2023, 00:06

General

  • Target

    bpldr.exe

  • Size

    392KB

  • MD5

    760f9df773fff3a82e8c40db3ad96d3d

  • SHA1

    cc6bb377f23f938c4336679678c3ee571f7c8d38

  • SHA256

    6f298fa797a2a4726e370d6674b66d11c439792fbb4467744d0cd3fc329beefc

  • SHA512

    a3d831e4aedcc6e7da5b0407927391f0c9c5d69e1e09ac9263ff116d8631f6a282bcd594593f2ced93055cbe841173becb74b973f18bb670d7a7ab4cb04f9870

  • SSDEEP

    6144:p80ryMQxI3Gt/HY2ENyJHb3e5rjj411qUMAb/t4m3orWOggpAyO:p8oiCHNyNbO5zjAb/mmoymF

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bpldr.exe
    "C:\Users\Admin\AppData\Local\Temp\bpldr.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3860
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://link-to.net/23425/844.328318650056/dynamic?r=aHR0cHM6Ly9jZG4uYmFzZXBsYXRlLndpbi8/az1DQTZSSERnNmRIOXczdkY3
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3892
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9e1f46f8,0x7ffc9e1f4708,0x7ffc9e1f4718
        3⤵
          PID:5024
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:3
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4692
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:2
          3⤵
            PID:532
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
            3⤵
              PID:3792
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
              3⤵
                PID:1784
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                3⤵
                  PID:3300
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:1
                  3⤵
                    PID:2184
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:1
                    3⤵
                      PID:1768
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:1
                      3⤵
                        PID:4056
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5564 /prefetch:8
                        3⤵
                          PID:2900
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5588 /prefetch:8
                          3⤵
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2032
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:1
                          3⤵
                            PID:3724
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6596 /prefetch:8
                            3⤵
                              PID:2468
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6596 /prefetch:8
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1480
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:1
                              3⤵
                                PID:2944
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6660 /prefetch:1
                                3⤵
                                  PID:384
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                                  3⤵
                                    PID:2612
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17055280700362419844,14366112733786858190,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                                    3⤵
                                      PID:4380
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3472
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:2160

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      483924abaaa7ce1345acd8547cfe77f4

                                      SHA1

                                      4190d880b95d9506385087d6c2f5434f0e9f63e8

                                      SHA256

                                      9a111c2b76c1b5f6d4f702502b9ff4326b7b5682921c2760286dd073824cb684

                                      SHA512

                                      e4ac0a0d5f06e056901c68488e34358a32a5bc7aeffcd82af7eba6043d0fa35eaa67a67c3716dcb661aaca441677819bcba7d35bc4efc6103f3ce32f78e32310

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      744B

                                      MD5

                                      555ba27e2a197c124a25ce06d6f9257a

                                      SHA1

                                      c6670c03e6b742a2afdfe9f6dcbb33731887d4b1

                                      SHA256

                                      de0e262566f1f5ed129275ea28776bc0a5f94c1d83dcdbb27deb243c92345a86

                                      SHA512

                                      073c5a86f011182970d6944c11ade2a16773fb4d35062df28045df398e0c6d09bd4ae6683a9ea9f2ac597ea7c9e394b135e213ac1e5d3ebf0efb3ed4733008f7

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      2KB

                                      MD5

                                      02763670549fa166a4fe349a0d2c6804

                                      SHA1

                                      bebff2eb9ebcd92bd7afa8c2bbef0dde389b5a42

                                      SHA256

                                      9415861af47f6506de115bf5fb111fc3c65d920dec1a38d276944400cb71181e

                                      SHA512

                                      b83656e8d9185395d05f578b31a103e1eec2c2e0e10ff542d0e81696f37547befb633ac7d88315704567379f9216d5a08715c11479de66547a4dbaeb798c371d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      111B

                                      MD5

                                      285252a2f6327d41eab203dc2f402c67

                                      SHA1

                                      acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                      SHA256

                                      5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                      SHA512

                                      11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      0837f5fe40bd2db44af25ef45983d1c0

                                      SHA1

                                      98462e85a59e1632e4e62067973556548771f061

                                      SHA256

                                      930b53df671ad259e93ea2ae69247b4a3006a02e10c083b5a3d229f6408b1799

                                      SHA512

                                      6637b84ad4cd46f06980c21bd42cee3cb546a00a53b25644ec4ad88e12023510af8090ddf11bcf7c628882083f651739eccaaf8d5536904a1baf0527267bb9bd

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      7KB

                                      MD5

                                      3c73de732ce5969f3548bac280ac3fae

                                      SHA1

                                      2af3695649d4cc90c2767d8a2260637f95e873ee

                                      SHA256

                                      e46756ceaa43843617f719a4ade0be07f3318793af3cf99e3e85b837aa096440

                                      SHA512

                                      a6facce05db49c696a615d797faf5ecd4806011b75f313408735d863c9df53a59c9631dea00f35b25b3af0d5ae02b0b35add65b9234943132125443b4bc6ce7d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                      Filesize

                                      24KB

                                      MD5

                                      1c706d53e85fb5321a8396d197051531

                                      SHA1

                                      0d92aa8524fb1d47e7ee5d614e58a398c06141a4

                                      SHA256

                                      80c44553381f37e930f1c82a1dc2e77acd7b955ec0dc99d090d5bd6b32c3c932

                                      SHA512

                                      d43867392c553d4afffa45a1b87a74e819964011fb1226ee54e23a98fc63ca80e266730cec6796a2afa435b1ea28aed72c55eae1ae5d31ec778f53be3e2162fc

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      3ce8b1e966c4c6c9050d09c4dfaf8100

                                      SHA1

                                      01bd4e983187ba5a61d6c1ec8a3906825f9b3c25

                                      SHA256

                                      119ef0c6a32f9a8919e75945e3f5c1da2b8f0a2987e2ccf51ed5f9dfe08dcaab

                                      SHA512

                                      ea1d68d22c2d29ccfc051ec586df431dd347dff7f5387ed2da01591e0156d1fc29b6d151dc63af60a77d88cc2595f84709353200cbfef19681eb695a312ffccf

                                    • memory/3860-5-0x0000000004940000-0x0000000004946000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/3860-11-0x0000000005080000-0x0000000005090000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3860-10-0x0000000005080000-0x0000000005090000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3860-9-0x0000000074B00000-0x00000000752B0000-memory.dmp

                                      Filesize

                                      7.7MB

                                    • memory/3860-8-0x0000000005080000-0x0000000005090000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3860-7-0x00000000078C0000-0x00000000078CA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/3860-6-0x0000000005080000-0x0000000005090000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3860-0-0x0000000000510000-0x0000000000576000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/3860-4-0x00000000074B0000-0x0000000007542000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/3860-3-0x00000000079C0000-0x0000000007F64000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/3860-2-0x0000000004FE0000-0x0000000005086000-memory.dmp

                                      Filesize

                                      664KB

                                    • memory/3860-1-0x0000000074B00000-0x00000000752B0000-memory.dmp

                                      Filesize

                                      7.7MB