Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
494s -
max time network
560s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
proext.exe
Resource
win11-20240214-en
General
-
Target
proext.exe
-
Size
3.9MB
-
MD5
b8ff3fa3797f21498614239d583cb636
-
SHA1
23fa79658831b5f4714bde8f39b4dfef1dc25351
-
SHA256
2d6916b87384d03a05d41e3a81e4aacb250d59b0333c4b3605a35b7ec58ecf57
-
SHA512
1831021746de038b37334c29ff35a79c3501d3d67893240eaa84833ecc66712754706fde2539cbb3a3c028dca62439dbc7799dec7eef085a65eaad89dc0e2497
-
SSDEEP
49152:jfLhJ9gW/ti8EeLn+CrsEGm1PEox7HnGe6lWnRD4kf00E2aNnuInZIU6ieHE3/A:jfLjp+2sX5G6Ab0e+mE3/A
Malware Config
Signatures
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 1 raw.githubusercontent.com 5 raw.githubusercontent.com 7 raw.githubusercontent.com 16 raw.githubusercontent.com 17 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 21205.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1648 proext.exe 1648 proext.exe 3616 msedge.exe 3616 msedge.exe 1184 msedge.exe 1184 msedge.exe 3044 msedge.exe 3044 msedge.exe 2760 identity_helper.exe 2760 identity_helper.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1648 wrote to memory of 3588 1648 proext.exe 81 PID 1648 wrote to memory of 3588 1648 proext.exe 81 PID 3588 wrote to memory of 1184 3588 cmd.exe 83 PID 3588 wrote to memory of 1184 3588 cmd.exe 83 PID 1184 wrote to memory of 1028 1184 msedge.exe 86 PID 1184 wrote to memory of 1028 1184 msedge.exe 86 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3592 1184 msedge.exe 87 PID 1184 wrote to memory of 3616 1184 msedge.exe 88 PID 1184 wrote to memory of 3616 1184 msedge.exe 88 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89 PID 1184 wrote to memory of 4920 1184 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\proext.exe"C:\Users\Admin\AppData\Local\Temp\proext.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\cmd.exe"cmd.exe" /C start https://github.com/vytrol/ProExt/raw/main/bin/proext.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/vytrol/ProExt/raw/main/bin/proext.exe3⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff41523cb8,0x7fff41523cc8,0x7fff41523cd84⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:24⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:84⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:14⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:14⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:14⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:14⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:14⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5652 /prefetch:84⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:14⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:14⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6296 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,9901965990924242908,6598334751182265266,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2908 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54aa37444d26e81e6f3837eb15bcaa892
SHA13d00127097989429f311f33daa8380ad7af4cb56
SHA256ab703e5dfb5b92527f094fad6ec479839375907700be9a2fd1c3cb9105f9e655
SHA512f21a34c234433a688602b2b56d6844f224641bea45b8585f77f4853e192107a65c5e104e10cd86c1d97ff41a22fd05d65224993803b22113ed0b517e686c5176
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
261B
MD52c2e6472d05e3832905f0ad4a04d21c3
SHA1007edbf35759af62a5b847ab09055e7d9b86ffcc
SHA256283d954fa21caa1f3b4aba941b154fab3e626ff27e7b8029f5357872c48cbe03
SHA5128c4ce1ea02da6ffb7e7041c50528da447d087d9ee3c9f4a8c525d2d856cf48e46f5dd9a1fedd23dd047634e719c8886457f7e7240aa3cc36f1a6216e4c00ee37
-
Filesize
5KB
MD5fe2f4612141ff14285cf270e4d08f559
SHA12f50b88e55ad9ee5e0ccc4492f4833eaa232d843
SHA2561e553232128e4dda14cade97d0f08cc6616b2f71aeb5f070e694f6e687cb3375
SHA51290366ecf6ed6e444011bf39fa2401fb689256344972f8c32b8469bb1598787a5aacd1899485b42215458a4ce114b76bb237db309dd487a7172d39ae2f22291e1
-
Filesize
5KB
MD5e208c5558e391a38c8dc33667f05664d
SHA1709d6f226a235c42f97d4f93d74dd6154a8510de
SHA25653608753ebd339ad75c17f24b304ceedb1540490a131ebe282471408ae742ac4
SHA5125859843bbe9f112de4c19dd54fb36fb99cfc19258c4230c8b041474949579a3ea583606eb75fdec3830e44825c6ab74315781bd103dca0502763f2b8ae45fee7
-
Filesize
25KB
MD540833cdbd5d7994ce8fa41b927a81b3c
SHA17d0113a707e380a6c12a7581af0184b6e49ba481
SHA256857a656a5e259b4671d5778cf4c93bf038e060b195cb7e9fb3d9c5bf25c8f2f7
SHA51238d77bf562e1abeffd91ada2832a160d29509ed748751f43de43c5846c9fffab53884fe31b19ee7336c36557d726b9ff17dcdda0f311d8f04407e44748f2f4e7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD578c7ab6f62e1fee8630ddfc1a8d45564
SHA1b187bb3c33800629ef250d12ba1aebc7797d4c0d
SHA256300178461007540b59b90204b18071863362d47616d209f68d41857ad9ecfe3b
SHA5120349456f38375ab6c000823687ea40484d4ebf0f5fd9bd1b5775eee4bd1f3ba8632a15818dde11a5fff2fe74b6b5c5f82fe8597a08aceda082fd2e70cc376cd8
-
Filesize
10KB
MD5c0875548eb876a2319c6347ad1e66a6b
SHA15a3c6457ada52c126d34da8aa508a6a356cf6cfa
SHA256ba142364fcc827e0246719b22d4ff559e2de81ae6e20c96bf1eef9ab9054d51a
SHA5126e33cf758d040b2b3ca7719afd692e17755d760a2648f7415417dee3294b094d07942a44f7ae8b54db636829e09ece1833cd0a4d5e6b4897fe94dcd7ad594669
-
Filesize
4.7MB
MD5e7e64afffc2594952cabd4cf070b16f5
SHA1208728253b1e4f3845744ba55bdade69b803a3b3
SHA256a7e18f8f2a8f879877bf352a4f784752155d6c8a135882f64727438037aa25d2
SHA512a0037d62479f6e4c33e422a598b72df4ce807ae1943b542c233ee1a98c5c2bcb50de9c3a33446b04ad5e21f6eab9520e2c9396321e07786fd6799a3da336c9dc