Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/02/2024, 15:04

General

  • Target

    sample.html

  • Size

    18KB

  • MD5

    1158b48e5776b156c1a6309d359fe1e0

  • SHA1

    819b531da017298a41aca2a34109daa3a0b38599

  • SHA256

    8e60fcd9caa3fff12ac2f88d72aed344247df32bb11e2478174ec37c54047881

  • SHA512

    34e6574c3761a5225b88a781d2cf0e07bcd3d770306c63741b2d12ea637beadbe8c1a3fd05ba41b59114e0c34fa17341fd1b788e01f465730580349c91b93bc6

  • SSDEEP

    384:r6LkDpmReVoOs4SN9ylKeGM/U8HhhbDhk7WQ3N2weKP/VJCBXQL:rMkBVoOs4SryI1MHBhb9yqEJQQL

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\sample.html"
    1⤵
      PID:4520
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:600
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:1884
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4076
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2912
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2476

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFD1450D3C54B92B44.TMP

      Filesize

      16KB

      MD5

      7580ac393237e121d24f96f7537d6c1c

      SHA1

      f4068e678f162185b238ba260f9710298355c647

      SHA256

      cfaea0f354d38302246824cfc85661f65d7c067d0f7aaa2d3792add00fe5c5d5

      SHA512

      906ca596abd84023c670f16a2448aa084319a3f3513afa8c39a30a03ad1ab95f87ee487faff6ed2e695f6c7f755436ebe9da1ec6cdcf63eb92d682a09e6de8eb

    • memory/600-92-0x000001A6A0480000-0x000001A6A0481000-memory.dmp

      Filesize

      4KB

    • memory/600-16-0x000001A6A3700000-0x000001A6A3710000-memory.dmp

      Filesize

      64KB

    • memory/600-35-0x000001A6A0490000-0x000001A6A0492000-memory.dmp

      Filesize

      8KB

    • memory/600-85-0x000001A6A2190000-0x000001A6A2192000-memory.dmp

      Filesize

      8KB

    • memory/600-88-0x000001A6A04C0000-0x000001A6A04C1000-memory.dmp

      Filesize

      4KB

    • memory/600-0-0x000001A6A3020000-0x000001A6A3030000-memory.dmp

      Filesize

      64KB

    • memory/2476-60-0x000002E111DF0000-0x000002E111DF2000-memory.dmp

      Filesize

      8KB

    • memory/2476-64-0x000002E111FD0000-0x000002E111FD2000-memory.dmp

      Filesize

      8KB

    • memory/2476-66-0x000002E111FF0000-0x000002E111FF2000-memory.dmp

      Filesize

      8KB

    • memory/2476-62-0x000002E111F10000-0x000002E111F12000-memory.dmp

      Filesize

      8KB

    • memory/2476-58-0x000002E111DB0000-0x000002E111DB2000-memory.dmp

      Filesize

      8KB

    • memory/2476-56-0x000002E111D90000-0x000002E111D92000-memory.dmp

      Filesize

      8KB

    • memory/2476-55-0x000002E1114F0000-0x000002E111510000-memory.dmp

      Filesize

      128KB