Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

23/01/2024, 16:21

240123-ttwr6scfg2 6

23/01/2024, 15:37

240123-s2w78sbfdr 6

23/01/2024, 14:53

240123-r9g8lsbcgp 1

23/01/2024, 14:45

240123-r4wh2sbceq 1

23/01/2024, 14:42

240123-r3fffabcdl 1

Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/01/2024, 15:37

General

  • Target

    Claim_3456.html

  • Size

    458KB

  • MD5

    9e310a76299c0c8cba40a0bba76bd934

  • SHA1

    7b1507b134ae06ca9182d23cbbd41cffe044473f

  • SHA256

    0d7c8f449cb7261716940fd57bbe6d583aa210cb08440c66038ee83207f9c34e

  • SHA512

    8eaffba06ed0aec2127dd47af3b5e1cc2467b4790f395b1ebf86779a46317dbb9a331d4dc7500cb8b8a50b7ba63ec79ff7aa2c68f8c5b18ff610c82cb1bb1c04

  • SSDEEP

    12288:9UYf1Nq4RLGZtQ9g4fRqAx1GVU8Nk1XEU:JGELSQ955q8j8LU

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Claim_3456.html
    1⤵
    • Modifies Internet Explorer settings
    PID:2752
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2828
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Claim_3456.html
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff85dcc3cb8,0x7ff85dcc3cc8,0x7ff85dcc3cd8
        2⤵
          PID:3052
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:2
          2⤵
            PID:3720
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:968
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:8
            2⤵
              PID:4376
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
              2⤵
                PID:1488
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
                2⤵
                  PID:3912
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:1
                  2⤵
                    PID:3728
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:1
                    2⤵
                      PID:1128
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3644
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2712
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1408
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:1
                      2⤵
                        PID:2968
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2672 /prefetch:1
                        2⤵
                          PID:4852
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2548 /prefetch:1
                          2⤵
                            PID:4828
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,6603984980568684654,3343906063456261907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1
                            2⤵
                              PID:3208
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1704
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1408
                              • C:\Program Files\7-Zip\7zG.exe
                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\e96a166c-f080-4957-965b-9b6acb5fa90c\" -an -ai#7zMap23604:156:7zEvent938
                                1⤵
                                • Drops desktop.ini file(s)
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:4804
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\SysWOW64\cmd.exe" /q /c respondents\ibidem.cmd
                                1⤵
                                  PID:1704
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /K respondents\suspect.cmd system star exe
                                    2⤵
                                      PID:752
                                      • C:\Windows\SysWOW64\replace.exe
                                        replace C:\Windows\\system32\\starr32.exe C:\Users\Admin\AppData\Local\Temp /A
                                        3⤵
                                          PID:352
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\SysWOW64\cmd.exe" /q /c respondents\ibidem.cmd
                                      1⤵
                                        PID:2540
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /K respondents\suspect.cmd system star exe
                                          2⤵
                                            PID:792
                                            • C:\Windows\SysWOW64\replace.exe
                                              replace C:\Windows\\system32\\starr32.exe C:\Users\Admin\AppData\Local\Temp /A
                                              3⤵
                                                PID:780
                                          • C:\Program Files\7-Zip\7zG.exe
                                            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\e96a166c-f080-4957-965b-9b6acb5fa90c\Claim_3456\" -spe -an -ai#7zMap30206:156:7zEvent17077
                                            1⤵
                                            • Drops desktop.ini file(s)
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            PID:1248

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            b09c5d9d170124cc803af2dd5f23e2b4

                                            SHA1

                                            41a3ddbafd6f3062f07ec162679bfab95fd88482

                                            SHA256

                                            5e6d5fcfb3805ecd4d9388837551cc02c5452f03cddba1b29b23fd02686befd8

                                            SHA512

                                            8fd1752211ec074f85d0ee59f39bea6e639199602d71ec947940575a9c515dda96b1eed5af10d513e21373f64a6d03146bb3251aa690830110ff4c6c486b4036

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            111B

                                            MD5

                                            285252a2f6327d41eab203dc2f402c67

                                            SHA1

                                            acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                            SHA256

                                            5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                            SHA512

                                            11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            505B

                                            MD5

                                            62d6fe8a024c4454ca3843e7b69f2265

                                            SHA1

                                            89382d8769db0d74cf0ffefbc58cbefabc68b599

                                            SHA256

                                            5ae2a6cfe826376808cd1b5fe774d8f280fb9757ebaf4d59c5164e8adb4ba255

                                            SHA512

                                            6f70b4b502186830747cdd16b77d52f801c0ee6ed65fe906fc2e8b0e0d72b51f87ca0b1ffefd0ac8a53eb1c32e7adffeaf76d976bd3e37ae876121a2badee0be

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            4KB

                                            MD5

                                            89810cd9e3fe6dcb373fdfbf67fdd80e

                                            SHA1

                                            fdae17c8570c3b6882a92cc535959b7fad2f3040

                                            SHA256

                                            0753e0b7d926bb209f6c241c58b52c9308472e1c8350b887c5ba1b93e986ea06

                                            SHA512

                                            dabd8c4d5dcc9c8373d25dd3f5e8cb520a9988dea07f5274530a98cc634448c4e14105387682edf58b2a092e9b2942d6c7c9ff110019986b5716a45b815e834a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            fc5cf3d8cb1e66ab2552cae2dee6e102

                                            SHA1

                                            553018482f8e5e1dccad4211755d17656612fe6c

                                            SHA256

                                            6b094357a27fd511f411992b8e672c3189275bc1befb3db5ef76fa54bdfc5519

                                            SHA512

                                            a6884c436036b4d2a413b4d178805f577b294ad53a0b4a35efcb0262c3f6cd60e06b9b83d1aeebcf16fe67d416d9a673293c916661bd539d56a67e30a49b94ab

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            c9027192e3b9b18bc88b767fa12ef451

                                            SHA1

                                            9edc295b622bf7dfb00dbd3e61837aba2b974e61

                                            SHA256

                                            489f22e7c46264bb56ccb98650f7fc38632fa8c4beb6321696a2229597ab9cd7

                                            SHA512

                                            96d882ce1ae10374e4a210dcdcf49d67fb0f29bf3016a35c11ca777721637805de8c4f48a21dec99c7fd98107eb18659791c2e99fc82ffd3b252e5352e303133

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                            Filesize

                                            25KB

                                            MD5

                                            c7092e044a47c593ef643da75dc6a456

                                            SHA1

                                            80e8bca84e362de86a7332742a62834ba887deb4

                                            SHA256

                                            18ac390cf8b5d7c5ceb90ce5e744deedc18be8e33c84e214bb64fbffd0686751

                                            SHA512

                                            b93ed015737a477a735c03e0cc884d746444d081dbb24d542ebbfbc2d30a5101799d2564733780091f28bf84adc3c7b2eadc265cb6bad6f26080abf63e0f085f

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            46295cac801e5d4857d09837238a6394

                                            SHA1

                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                            SHA256

                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                            SHA512

                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            206702161f94c5cd39fadd03f4014d98

                                            SHA1

                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                            SHA256

                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                            SHA512

                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            984f3c585fd3386b34b017f18022cb35

                                            SHA1

                                            b187378a1949550a02d9df6c80a8bc52d6209338

                                            SHA256

                                            cd308462e0f079dc5b5d12032daee0b16c593990f3809b055ece52c78d6f1db4

                                            SHA512

                                            46dce1daf3997deaa4dfb704b7245481b0abe6ab868d71a2968b5e0d22065104c6643600e70510240c2de1d7dca130c06fe705b246af649b3f458c887d62ccc9

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            62312d35baae865ad10426951b17ae72

                                            SHA1

                                            eef14c221b1ee707a1056489dad0b202658413a4

                                            SHA256

                                            7d041ef491f9641f6de9e96b18b85be9b33bf2389e926b791479a13010c55d0a

                                            SHA512

                                            52e543c3e7ab2d70f276e4bc9b09c29dd753f7744d84cb88442f2b1f6c5ba1ff2bb7fb0aad633b5190814219e30d9db7ceb92a97d1e74d6a84aa0f96717765cd

                                          • C:\Users\Admin\Downloads\e96a166c-f080-4957-965b-9b6acb5fa90c\respondents\ibidem.cmd

                                            Filesize

                                            349B

                                            MD5

                                            8950d4b6c364d85abb15f70088858f2b

                                            SHA1

                                            0dbd1603fb7555d70b2d9f809f97152efd934050

                                            SHA256

                                            32095d63a9dd54a38bddd78140dbe2e9019175cd3ccc94839b9ee1bcac905c68

                                            SHA512

                                            597fe88e77c31382e551bd042abda2ae52fc1503b17aa8a46229e84d5c8b11074366dc8492abe442283d6ec432e6a11d1ea28941e5f0a08272466dce5775cc85

                                          • C:\Users\Admin\Downloads\e96a166c-f080-4957-965b-9b6acb5fa90c\respondents\suspect.cmd

                                            Filesize

                                            359B

                                            MD5

                                            9a65c4a7de594744d4d90812eead702f

                                            SHA1

                                            0b8d0279b442c949107c771756a6364e400757eb

                                            SHA256

                                            76b79f0f020c13cc1fd59393411edc6ff114b3a52a5ec28139aa90bcfc9f84d0

                                            SHA512

                                            5bf5f0b0cdc4814a5d8451fbe8c79911217677f80c48372ae76eaca9816ff2167220ce846f81f50ccfeff7db7940e5667a2ecee7ac30d6f1fa7d1b3211e16c18