Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
284f70d2dbf419c70a6f2d345116bdfe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
284f70d2dbf419c70a6f2d345116bdfe.exe
Resource
win10v2004-20231215-en
General
-
Target
284f70d2dbf419c70a6f2d345116bdfe.exe
-
Size
207KB
-
MD5
284f70d2dbf419c70a6f2d345116bdfe
-
SHA1
aaa10108e3b3975bad75ae973d11fa26d43bcbe1
-
SHA256
139beb0e5b4cc80f0825fa410ed6288db8dd21b40c9f4b3bde8857e73443c309
-
SHA512
9b48123f356459408d9d10dc1886cc5200faabe0a68c062cb110bd0704b8151575dfd15e062686270a007a7a411c0be83fad7d5d393db583ac2f5a7e56702c1d
-
SSDEEP
6144:Xz+92mhAMJ/cPl3iwjaozlx/LVXHSPF0Mfs:XK2mhAMJ/cPl1T7VXJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 284f70d2dbf419c70a6f2d345116bdfe.exe -
Executes dropped EXE 1 IoCs
pid Process 800 wsmallstub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 800 wsmallstub.exe 800 wsmallstub.exe 3264 msedge.exe 3264 msedge.exe 1260 msedge.exe 1260 msedge.exe 5536 identity_helper.exe 5536 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 800 wsmallstub.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 800 1360 284f70d2dbf419c70a6f2d345116bdfe.exe 93 PID 1360 wrote to memory of 800 1360 284f70d2dbf419c70a6f2d345116bdfe.exe 93 PID 1360 wrote to memory of 800 1360 284f70d2dbf419c70a6f2d345116bdfe.exe 93 PID 800 wrote to memory of 1260 800 wsmallstub.exe 108 PID 800 wrote to memory of 1260 800 wsmallstub.exe 108 PID 1260 wrote to memory of 4676 1260 msedge.exe 109 PID 1260 wrote to memory of 4676 1260 msedge.exe 109 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 2080 1260 msedge.exe 110 PID 1260 wrote to memory of 3264 1260 msedge.exe 111 PID 1260 wrote to memory of 3264 1260 msedge.exe 111 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112 PID 1260 wrote to memory of 4996 1260 msedge.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\284f70d2dbf419c70a6f2d345116bdfe.exe"C:\Users\Admin\AppData\Local\Temp\284f70d2dbf419c70a6f2d345116bdfe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\wsmallstub.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\wsmallstub.exe" "C:\Users\Admin\AppData\Local\Temp\284f70d2dbf419c70a6f2d345116bdfe.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ct2416693.ourtoolbar.com/cre/?isorganic=true&requesterid=dmstub3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff8492d46f8,0x7ff8492d4708,0x7ff8492d47184⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:24⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:84⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2092 /prefetch:14⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:14⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:84⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:14⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:14⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:14⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17996985149203205324,5231929924108851827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:14⤵PID:5848
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5011193d03a2492ca44f9a78bdfb8caa5
SHA171c9ead344657b55b635898851385b5de45c7604
SHA256d21f642fdbc0f194081ffdd6a3d51b2781daef229ae6ba54c336156825b247a0
SHA512239c7d603721c694b7902996ba576c9d56acddca4e2e7bbe500039d26d0c6edafbbdc2d9f326f01d71e162872d6ff3247366481828e0659703507878ed3dd210
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD59b0ddf61c820f1c48bf2129529a91583
SHA1b49b4fbe177b770d097c9b958c3f020563db1ffb
SHA256df05eacb06df445e46275b22ef8c5467aa21fe5faba9cd60f371e0fe5d8ef024
SHA512d8d73ba93a785f428ef69547f58345a575c355a27dabdfec46d6477ea871f20769cb11beb2a0ca5f911be7fa45fe1ab1749f0b9bb273477c694802c87df5b751
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD531d4d0516470e03955c2cbf715228635
SHA1d6abd80f59f33bad9f2c5635db88ae251cfda851
SHA25621a2fc4e7eac5c6beb16e5253a488b0404cdfa57450edcdbc9bd1d93d317866c
SHA51211c875b3d38828dbe58a2199ee9e0db0f39847feffc046d6b1e81c6f11c273e64d21f26f95ef84d13b0e997ec3bbbb994e7b4ba5f8a00c2d072b011369c237c3
-
Filesize
6KB
MD5e744aa204bab2f409b135107c7565e9c
SHA16e584926f039ad6ce53e3048bb398296236de2f8
SHA2566c380bee1483451efb69c0cc1fad3aa4640d0aee9c5e1f14e098e99f0c4e95bd
SHA51230d5a7277adec605d94eb4fc3be5647553fb59e1cf78d5e51dc8fe0167731799e2b1b1aa2779592c8c70d900502d71ec1f975370e6c7daedde182283fec1901d
-
Filesize
24KB
MD5f5b764fa779a5880b1fbe26496fe2448
SHA1aa46339e9208e7218fb66b15e62324eb1c0722e8
SHA25697de05bd79a3fd624c0d06f4cb63c244b20a035308ab249a5ef3e503a9338f3d
SHA5125bfc27e6164bcd0e42cd9aec04ba6bf3a82113ba4ad85aa5d34a550266e20ea6a6e55550ae669af4c2091319e505e1309d27b7c50269c157da0f004d246fe745
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52da17bbc8af3f12fac4b1c9ee7ad8335
SHA17f0519c9063864ff1e4387ce2fa8172d13082881
SHA256c136048fe99012ee3a3eb845defb3c9a4262b14cd0f15bc9082cba3459287928
SHA5120d7391f246a368f3e4ad8b840be1e9b087e56a957d1efc88b0deeb97e2677cc3aa3e3aa6922dfec511e793ceb9a8b7be98f313df3eaf3f62d5532c025eb95499
-
Filesize
1KB
MD5f31ab27282cf444ef1f263320be6b705
SHA1bde4d76ffc88d14e1128b4928ddd4639a7744b84
SHA2561a3ec42f393635307ae2e369ef50a8eb0fbbe02cd2f82c4c6d3486d294ddcceb
SHA512f6b803b087444de0cc6fa832c4be491c738c0d643895d844a861357e2b29257fe7ba91f2e4e61ee715a5b533b0449c14428f79ec651f3cfa3823eaaaa99ca367
-
Filesize
3KB
MD5b64d43be07c431b8b2477f7303b2a8e2
SHA1e42f245ac4078f8b84e85514574244846c483157
SHA2564fd26dc9c1e6f863b7365d24559f55c39e1c07741e3cbba9f45175198e969256
SHA5122fcc9516db288e2cd7876057db6e7172b0b9775f8b094ab8547aac0e3075bd4c0f34ec575692d68afb77e853c86fa85e973a727dc0629dd869e14929f5012b80
-
Filesize
64KB
MD58c2da04dca2b61ce494e862a1cd405e8
SHA133fc183e92bda3b6de6d1153e8e7e6c7080cf2d3
SHA25675be02cea08170497f2d2e7af95f1934cc9b5f7b092c4a9e230dcfd8338db0fd
SHA512b3e3fe30607f72d54e2befbe76952fc87743bd78f567bb1a541ff204b3b6b22d40cc5f4bfa01dd605e7063bee916abf7a3bb1cacd44fa9a5151c43c34f24fe9d
-
Filesize
238KB
MD5bebe87e70601cbc95c4a6bad2a2e986d
SHA1f9620534bf97ff4ecaadd3afc3808d3abecdac65
SHA256f1fe856f82e455e19d17f09e0b8529993aa540d4231c07065f0c28ecf0f25dd4
SHA512dae6eabf8314529be871d56c4c573cc114309d77a5223f48227d0c13964cd6606efbe413e8b1fdd7624be89fc31be8caa7d299ed2e659f9c4e1982f21e1cffd2