Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 18:24

General

  • Target

    Feather Launcher.exe

  • Size

    145.0MB

  • MD5

    2e2bd5dfcdd123064c48a7920c62560d

  • SHA1

    86e043e69cc6fa9930dcca5f00e1ae5e66735fe5

  • SHA256

    cddcf8a2008fdf3c7bfe8337da7e2345ec72104e60fcc0ce392752cd35839430

  • SHA512

    3336da9b2ac8893abf1a02e27ab8e63718c123db8078f9fcad507030dc85807d07941004045cdfb473830efaf3c94acb9b6be075d8932be7220b65dcfe506a58

  • SSDEEP

    3145728:qFJz+MnHejtWPrMYQWXPQdP57obOO4X7v+N303rVl+:qFF+MnHejtWPrMYQWXPQdP57obOO4C6u

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe
      "C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Feather Launcher" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1704,i,12395519366800356350,10435275366938585,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:2404
      • C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe
        "C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Feather Launcher" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --disable-blink-features=GetDisplayMedia --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2360 --field-trial-handle=1704,i,12395519366800356350,10435275366938585,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
        2⤵
        • Checks computer location settings
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe
          "C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe" C:\Users\Admin\AppData\Local\Temp\resources\app.asar\preload\preload-mod-watcher-fork.js
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4012
        • C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe
          "C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe" C:\Users\Admin\AppData\Local\Temp\resources\app.asar\preload\preload-skin-watcher-fork.js
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3812
      • C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe
        "C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Feather Launcher" --mojo-platform-channel-handle=1916 --field-trial-handle=1704,i,12395519366800356350,10435275366938585,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:3040
        • C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe
          "C:\Users\Admin\AppData\Local\Temp\Feather Launcher.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Feather Launcher" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1704,i,12395519366800356350,10435275366938585,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3000

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\c9370f7e-178d-4a87-989b-abed1d5af716.tmp.node

        Filesize

        4.0MB

        MD5

        3e022fe9cb40a17338105d8cb8ce99cd

        SHA1

        25bd2a494ecb5eb9091e49ea71f52dcb68b3de5c

        SHA256

        c24aa8126220a2363bf10d16a7b19e203146537aed1a0c08414f964268b4d030

        SHA512

        b11755e8ccabeb2d3ddd6b7d680b427b8e57203db5eaa510e645979ab96b887320ad78039da536b1d182f922afda428fcaf27ae459f9f84816a8bc67bd4955c4

      • C:\Users\Admin\AppData\Roaming\Feather Launcher\82c3050c-27ae-414b-ad1d-32b6d884f893.tmp

        Filesize

        86B

        MD5

        d11dedf80b85d8d9be3fec6bb292f64b

        SHA1

        aab8783454819cd66ddf7871e887abdba138aef3

        SHA256

        8029940de92ae596278912bbbd6387d65f4e849d3c136287a1233f525d189c67

        SHA512

        6b7ec1ca5189124e0d136f561ca7f12a4653633e2d9452d290e658dfe545acf6600cc9496794757a43f95c91705e9549ef681d4cc9e035738b03a18bdc2e25f0

      • C:\Users\Admin\AppData\Roaming\Feather Launcher\Network\Network Persistent State

        Filesize

        625B

        MD5

        d2efb695cd4811c5aa72c631e2df85d2

        SHA1

        a970689805c4ac0e5c902c297e5362b57bd11ef0

        SHA256

        1b98209d5d725dbf58a7d650a81fedaf69de0feba7c5b8ece56e4b16b73bf9a6

        SHA512

        3e20ba10c6daa76519eda53cb8e50710c133f29115be43a8a339078192e6d3df2ace7ac2dd151ea44ecea6105a8203e686810c089b1e9f8af304bfbb24aa0f1b

      • C:\Users\Admin\AppData\Roaming\Feather Launcher\Network\Network Persistent State~RFe5954fc.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • C:\Users\Admin\AppData\Roaming\Feather Launcher\Network\TransportSecurity

        Filesize

        370B

        MD5

        81a404a7d35b5a520a14d03c55db25f8

        SHA1

        df9f07e56e871cc91a1784c33d0491c2474b2f02

        SHA256

        dcdb21600fc8aaec023fe19d327e7b0440b0696b220f8c638c59b483afe4c13d

        SHA512

        75986e8fd71a137c502696e4f8e68ea9e5b1bd64e929b2f846f9303f9bbd0ec61a055c6331cb035206953dd55d1ba67eb5f63f204b996d410dae9535a8d152a6

      • C:\Users\Admin\AppData\Roaming\Feather Launcher\Network\TransportSecurity~RFe593668.TMP

        Filesize

        370B

        MD5

        7137c04030d993099f14207e7b641827

        SHA1

        ef468b6c08b946c91e9673664c6b33f55ab0bb73

        SHA256

        46c6b91f05eb8735659e9091213873d274fa37923c2f0c4a691deda31de66390

        SHA512

        ca3d449c49eb76183927153c7c9f4c07f2a50bceabf2f65bb03b0aba322181f59c80a22e430d30e5c138f3cf922a72245b22f9fb054e2773ef480980ce8fe210

      • C:\Users\Admin\AppData\Roaming\Feather Launcher\Network\c8cf12e9-81bd-4286-9f98-1233d8454387.tmp

        Filesize

        370B

        MD5

        2c0e585e502696acc22dc798b9e0a2ef

        SHA1

        370819366e8d5803b6027ac5a71d0a3e32270c1a

        SHA256

        41a93cee6a000fa2055a7444786df6596b7ad35d142d7e61c7c7f6240a59f965

        SHA512

        5ec0dbc944744063f82829aa12dd60de806876869863ec6d70b5c943874e9a1149cd43ad35e32980810c4dc8499ecf6557782a751380170952ad914962489611

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • memory/2404-6-0x00007FFA497E0000-0x00007FFA497E1000-memory.dmp

        Filesize

        4KB

      • memory/3000-110-0x000002996D0B0000-0x000002996D0B1000-memory.dmp

        Filesize

        4KB

      • memory/3000-109-0x000002996D0B0000-0x000002996D0B1000-memory.dmp

        Filesize

        4KB

      • memory/3000-111-0x000002996D0B0000-0x000002996D0B1000-memory.dmp

        Filesize

        4KB

      • memory/3000-117-0x000002996D0B0000-0x000002996D0B1000-memory.dmp

        Filesize

        4KB

      • memory/3000-118-0x000002996D0B0000-0x000002996D0B1000-memory.dmp

        Filesize

        4KB

      • memory/3000-119-0x000002996D0B0000-0x000002996D0B1000-memory.dmp

        Filesize

        4KB

      • memory/3000-120-0x000002996D0B0000-0x000002996D0B1000-memory.dmp

        Filesize

        4KB

      • memory/3000-121-0x000002996D0B0000-0x000002996D0B1000-memory.dmp

        Filesize

        4KB

      • memory/3000-122-0x000002996D0B0000-0x000002996D0B1000-memory.dmp

        Filesize

        4KB

      • memory/3000-123-0x000002996D0B0000-0x000002996D0B1000-memory.dmp

        Filesize

        4KB