Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
20/02/2024, 14:13
240220-rjxwdaaa24 1020/02/2024, 14:10
240220-rgvm8shc9w 1020/02/2024, 14:08
240220-rfkrmshh78 10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/02/2024, 14:10
Behavioral task
behavioral1
Sample
craftrise.dll
Resource
win11-20240214-en
Behavioral task
behavioral2
Sample
injector.exe
Resource
win11-20240214-en
General
-
Target
craftrise.dll
-
Size
519KB
-
MD5
f81ba016c71244166f708a8a512a7665
-
SHA1
2eac4fd022ae1da49ae5362fa016df15fe137551
-
SHA256
730e68053d2556af400838dbfb93afe67170fd0ec1de1fd71cb876ff3e05cc41
-
SHA512
eca5bfd34aa0bed5dfad4c428c1a34c167aa4b222a73eced86172ffbed91b0f1840d90fedcc02c21ddd16aa3dae18695ac4e0b55ab0557d2f2d77edb40d0a314
-
SSDEEP
3:LxzUzUzUzUzUzUzUzUzUzUzUnSAtnSAtzUzUzUzUzUzUzUzUzUzUzUzUzUzUzUzB:tP
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1002246581-1510179080-2205450789-1000\{7724A23B-E63F-4EA2-9079-BD456E98447A} msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 1476 msedge.exe 1476 msedge.exe 2224 msedge.exe 2224 msedge.exe 2008 msedge.exe 2008 msedge.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 676 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 688 SystemSettingsAdminFlows.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 4904 4108 msedge.exe 104 PID 4108 wrote to memory of 4904 4108 msedge.exe 104 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 2240 4108 msedge.exe 105 PID 4108 wrote to memory of 1476 4108 msedge.exe 106 PID 4108 wrote to memory of 1476 4108 msedge.exe 106 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107 PID 4108 wrote to memory of 2120 4108 msedge.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\craftrise.dll,#11⤵PID:4360
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2840
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,1⤵PID:772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:2308
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:560
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:4340
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" RemoteDesktopTurnOnRdp1⤵
- Suspicious use of SetWindowsHookEx
PID:688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://www.bing.com/search?q=how%20to%20use%20remote%20desktop%20to%20connect%20to%20a%20windows%2011%20pc%20site:microsoft.com&form=B00032&ocid=SettingsHAQ-BingIA&mkt=en-US1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff93be03cb8,0x7ff93be03cc8,0x7ff93be03cd82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4776 /prefetch:82⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,9561275293551644207,12819987637820033583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD590bbaa873cb1024ace83f887dfde38ae
SHA1922416490e14f9098df969a56b75e7523f108e53
SHA2562ff8abbbdad2acf5f04a3b47624055a0f2c36a09b0db3945b494f7eb92ae87bc
SHA51260587031845ee5ae354c760bd2714a47ff561d3bd6e8aab7b2073d1b9c6b544c7eca94078d9cdefcd87b44adce4e814852c1e8f6af8ca3bdd5b0ddd0312e57b6
-
Filesize
29KB
MD5df217f862f4073ce4585999df73a53fd
SHA18f39eb965e90eee20c2e94f547acf0db9aec24ae
SHA256dfc2a82c870fd4c1a5b67929c316aebf1bfe0e8fdb90d64158a111feeae9c0e3
SHA512f52da493abb8eeae24642e958cfa6ecf50101cdb0038ca7b952a19f0df0531e44828e4d2b9e365fd08a73a3f78009fd76af37a1ae58b8ec526720356c2767738
-
Filesize
5KB
MD51d53c82a024763dc8fa4273cab37cc26
SHA178afc0a9a7a70b8ab7faf0ffcc4c6779e4ccdada
SHA25647a401063b18d54848c406f8ad2aa23700444b66d89d5186c7a38f7d1c910342
SHA512ecc62c81fd94e4f269f347a3863a16e8abdbff51881eb3529b452fd2d3ec7c02b5002ce1f751149577df14051cece0affe080fc04485c5f579a5b028384284c2