Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/02/2024, 17:01

240222-vjw6madc37 4

22/02/2024, 16:54

240222-vexxcscf9z 10

22/02/2024, 16:51

240222-vc87lscf7x 6

22/02/2024, 16:48

240222-vbksmacf6t 1

22/02/2024, 16:46

240222-t93knacf41 4

22/02/2024, 16:44

240222-t8vtesda83 4

Analysis

  • max time kernel
    65s
  • max time network
    88s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/02/2024, 16:44

General

  • Target

    sample.html

  • Size

    56KB

  • MD5

    13f5ced3be33542807ff00edec69fad2

  • SHA1

    5e2bcd38d5ab54d43043feada4c9dcf4e0928c06

  • SHA256

    88314ed5ddebc9c1f87b88d3b1f56d55c991036cb09522d8c20f6e01b74c22e8

  • SHA512

    ec40cbf6a87d9d74977bc7290cfff89b3e01857f7702eae67786f5ea4ae76c15eed22e233c545a30961fa4f730a748a06a63d40c3d7218b5abf55ed33cd243b6

  • SSDEEP

    768:a3yvV72MqMZRfmzOt26Ws/g36Or9v96AgtWLyvV72MqgZRfZtWL/g36Or9v96AGE:a3akfxDeHfxh

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\sample.html"
    1⤵
      PID:4572
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4984
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4436
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4908
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1116
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:820
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa3ab59758,0x7ffa3ab59768,0x7ffa3ab59778
        2⤵
          PID:3212
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1840 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:8
          2⤵
            PID:3588
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:2
            2⤵
              PID:1876
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:8
              2⤵
                PID:212
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:1
                2⤵
                  PID:4268
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:1
                  2⤵
                    PID:1384
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4440 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:1
                    2⤵
                      PID:2132
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:8
                      2⤵
                        PID:2276
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:8
                        2⤵
                          PID:704
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3700 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:1
                          2⤵
                            PID:4540
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4376 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:8
                            2⤵
                              PID:508
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3124 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:8
                              2⤵
                                PID:2488
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5296 --field-trial-handle=1812,i,1712649250451548556,3943393496246614266,131072 /prefetch:1
                                2⤵
                                  PID:4856
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:888
                                • C:\Windows\system32\AUDIODG.EXE
                                  C:\Windows\system32\AUDIODG.EXE 0x414
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:68

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                  Filesize

                                  40B

                                  MD5

                                  9a0520197a7f7681288a56c368880f05

                                  SHA1

                                  23c3c8ccbc36ea6504e98839453109dcf19438b0

                                  SHA256

                                  b67de484a503964afd5d3eb451b930eb345b0480e3e12cc496cb41aa377ef96d

                                  SHA512

                                  89b445b5d031199f604b803419127730cdb82bfb77bf1caa4b03a61be8322ea057dac3c21899e932a32e282bd06048d8b37688976a753fb564079509632a7889

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\80d3cca6-7cae-4f23-8ef9-93f0432ffa2a.tmp

                                  Filesize

                                  6KB

                                  MD5

                                  208de0b7af8e1119843510dde048985c

                                  SHA1

                                  5c16d6a6a475da81f2bc51255cb6ca978d9e6080

                                  SHA256

                                  d6507d5e1c55536e22a3d81c460cdbb9f29d3d9a6b9f5adf2086f4756f906fe2

                                  SHA512

                                  d46eec8a96ab82a360b2973a2041d02d57422b879c933e3c41691f302ca08248ac697bb774bf09af3278d0d4879ccdd79914da783012dc9fc297a15364945483

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000002

                                  Filesize

                                  202KB

                                  MD5

                                  9901c48297a339c554e405b4fefe7407

                                  SHA1

                                  5182e80bd6d4bb6bb1b7f0752849fe09e4aa330e

                                  SHA256

                                  9a5974509d9692162d491cf45136f072c54ddc650b201336818c76a9f257d4d2

                                  SHA512

                                  b68ef68c4dcc31716ce25d486617f6ef929ddbb8f7030dd4838320e2803dd6dd1c83966b3484d2986b19f3bd866484c5a432f4f6533bb3e72f5c7457a9bb9742

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  120B

                                  MD5

                                  2e87ce86ed0f2b12728c9e8b2f592664

                                  SHA1

                                  d1f666b2865c1f181cc6f7f741bfd008b339d046

                                  SHA256

                                  89391dbecba2021ddbdc0eaa1bfaecef455faf3a8c27fe7ce6c99f309c282ffb

                                  SHA512

                                  92d28612bf7fe1dcb0fd957f1f94bf853a70da25e4fed07caebae4948ab141fe77d5f4b085829b58170409dc55b1d6edd79a4553ad108beae1598be807f4af03

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  371B

                                  MD5

                                  396365e58f617065ecfb227d56240fd2

                                  SHA1

                                  ea30b4493d8875ea1f81d4e098198f391f967528

                                  SHA256

                                  e1d39c891e46e4b2c2cb03fa9b4eedc2eb602feeeb370b61fd2b9e5fd4087468

                                  SHA512

                                  82e56188e41c90bfe1efb4c9956d0477cc1460c7763ad73058efc668e326a2b5c13fdb0bc03dead6a80f39ab6b42032cb468b2393211eefe0c8c9dc3131f682d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  74ce3132f1c27e8693cfcf282956a783

                                  SHA1

                                  db0f6cb2a6965fdc27f61948766d7090611d8ec8

                                  SHA256

                                  a412ba4f910a6f3fcb075abef25a9bf637a099c62b030bf4dd849dc8e5af0113

                                  SHA512

                                  e02310ce26c2ae0fbfc31358e65ef0457da6dc6970100586b375dbc13e7746af7bd8ae4974b9ec237f7334dd4d32c7854d386543a25f255cd8aff20ef75bd569

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  af529cf1d4812d73b79c58b6ca8d7b8b

                                  SHA1

                                  5a330ed82ef213693065747e5f3f54b64c662a63

                                  SHA256

                                  91b55bb83de61c388bd00416049e7aa541009e660be8d9be2f4f927d9ca7c340

                                  SHA512

                                  77808683aae95febd3917b23678b76d0c3af09ab1eaa78f39dcebe4a5d5495f121c232a534a7c1ae2fd58f8ff5a0df3789bd3d9fc8f7c2e5ff293a88dd34530c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  257KB

                                  MD5

                                  ca29703e4ee9f7e7d70ffc2718f3c8c8

                                  SHA1

                                  98af679917875fe91062bf134c812e3fc1286554

                                  SHA256

                                  f79fd7320a293e3ef85d0f10277ead73684265180b02e8cb8de367ad1899bde6

                                  SHA512

                                  f6624a9cb160317c9c87e15a15349f4208d878dc796d333124578f9f04d3bf5bcec5de16b839ab12d8248609bbf94641f6af93329ff4b448f93bc026c797dd64

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  257KB

                                  MD5

                                  9e507d228daaaf5cba88c64c1b0166e7

                                  SHA1

                                  3be87b970dec4602a51086e02cbfb8bc9550b437

                                  SHA256

                                  c320c931cb5674f8f9ed47f6a7d30a7674ce255185e0c29949326ea7329e7428

                                  SHA512

                                  044a2adbb22d49b8e298497e379acf29fb699438f0bc85cc8b782a426a1786c16242ef55b807921c304c433f5e599b10de715ae4c6e60e61a38d0e2a14e3e3c4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                  Filesize

                                  93KB

                                  MD5

                                  c170b472710834391562b947c7f54240

                                  SHA1

                                  e664f354f2de22b23d21b1cb9de7be70d3d0b41b

                                  SHA256

                                  17b41a5996eeca864f236de689367d612114fbe5846551d996ddf86d5dba25b1

                                  SHA512

                                  1c11c87661e3518d704fd2eb32600a96d91c0989c5d5370efae22360971b144e431195689d4a5bde5f230fedbb787fd96bff3dc095cda0f50a9040c8f8695cf7

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe58a592.TMP

                                  Filesize

                                  93KB

                                  MD5

                                  27eed20c6ed12a7c427879b7df9d7618

                                  SHA1

                                  32e6287cf5762264afc5319577bbd98ffb5f0c17

                                  SHA256

                                  c3cf7cf795ff1d1a1a464b7b78086512a6befcbd4ddccff657fcfdd3547e01d7

                                  SHA512

                                  4fe0863ca0218b2a51a937fc88f80726dfc81fce54638a2e435ff595f9280565c2720f788dc27c75b3ec35cabe763f8a47493190aecc2b4b85bc1324f17ff28e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                  Filesize

                                  2B

                                  MD5

                                  99914b932bd37a50b983c5e7c90ae93b

                                  SHA1

                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                  SHA256

                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                  SHA512

                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NZZSGF9\edgecompatviewlist[1].xml

                                  Filesize

                                  74KB

                                  MD5

                                  d4fc49dc14f63895d997fa4940f24378

                                  SHA1

                                  3efb1437a7c5e46034147cbbc8db017c69d02c31

                                  SHA256

                                  853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                  SHA512

                                  cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFC32CF72CC46F5D8C.TMP

                                  Filesize

                                  24KB

                                  MD5

                                  4e8c041a7851354a3ee514e9108065a8

                                  SHA1

                                  58c8e310e694656b5dd0071fe3a020a57e3e9523

                                  SHA256

                                  98dcddb85eb3678ac1d3e8ec42bf703ccd88e73a4c75b64361b20331649edf0a

                                  SHA512

                                  a4d0c971bb87c4e4b574941fe7b81e60bbd1505996bab6a895fe485f22ed18f5a7d475b829eb3da1399bf6c2123121f937d634f65e977380e210480b87b6ad4f

                                • memory/820-66-0x0000028BFAEC0000-0x0000028BFAEC2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/820-58-0x0000028BFAE40000-0x0000028BFAE42000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/820-56-0x0000028BFADF0000-0x0000028BFADF2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/820-60-0x0000028BFAE60000-0x0000028BFAE62000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/820-62-0x0000028BFAE80000-0x0000028BFAE82000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/820-64-0x0000028BFAEA0000-0x0000028BFAEA2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4436-109-0x000001C987AE0000-0x000001C987B71000-memory.dmp

                                  Filesize

                                  580KB

                                • memory/4436-112-0x000001C987AE0000-0x000001C987B71000-memory.dmp

                                  Filesize

                                  580KB

                                • memory/4984-84-0x00000216403F0000-0x00000216403F2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4984-87-0x000002163C0F0000-0x000002163C0F1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4984-91-0x000002163C070000-0x000002163C071000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4984-0-0x000002163B920000-0x000002163B930000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4984-35-0x000002163C0C0000-0x000002163C0C2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4984-16-0x000002163BBE0000-0x000002163BBF0000-memory.dmp

                                  Filesize

                                  64KB