Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    161s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/03/2024, 07:43

General

  • Target

    http://goorganics.com.au

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://goorganics.com.au"
    1⤵
      PID:4740
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1200
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4976
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4900
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2648
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4488
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF243C4CD6CFA5BC94.TMP

      Filesize

      24KB

      MD5

      d3cdb7663712ddb6ef5056c72fe69e86

      SHA1

      f08bf69934fb2b9ca0aba287c96abe145a69366c

      SHA256

      3e8c2095986b262ac8fccfabda2d021fc0d3504275e83cffe1f0a333f9efbe15

      SHA512

      c0acd65db7098a55dae0730eb1dcd8aa94e95a71f39dd40b087be0b06afc5d1bb310f555781853b5a78a8803dba0fb44df44bd2bb14baeca29c7c7410dffc812

    • memory/1200-16-0x0000015208400000-0x0000015208410000-memory.dmp

      Filesize

      64KB

    • memory/1200-35-0x0000015208FC0000-0x0000015208FC2000-memory.dmp

      Filesize

      8KB

    • memory/1200-168-0x0000015208ED0000-0x0000015208ED1000-memory.dmp

      Filesize

      4KB

    • memory/1200-0-0x0000015207B20000-0x0000015207B30000-memory.dmp

      Filesize

      64KB

    • memory/1200-164-0x0000015207C50000-0x0000015207C51000-memory.dmp

      Filesize

      4KB

    • memory/1200-161-0x0000015207CA0000-0x0000015207CA2000-memory.dmp

      Filesize

      8KB

    • memory/3112-94-0x0000016A69B00000-0x0000016A69B20000-memory.dmp

      Filesize

      128KB

    • memory/3112-126-0x0000016A69D70000-0x0000016A69D90000-memory.dmp

      Filesize

      128KB

    • memory/3112-84-0x0000016A46E90000-0x0000016A46EB0000-memory.dmp

      Filesize

      128KB

    • memory/3112-87-0x0000016A57900000-0x0000016A57A00000-memory.dmp

      Filesize

      1024KB

    • memory/3112-91-0x0000016A68C20000-0x0000016A68D20000-memory.dmp

      Filesize

      1024KB

    • memory/4488-63-0x000001BC138D0000-0x000001BC138D2000-memory.dmp

      Filesize

      8KB

    • memory/4488-71-0x000001BC13AF0000-0x000001BC13AF2000-memory.dmp

      Filesize

      8KB

    • memory/4488-69-0x000001BC13AD0000-0x000001BC13AD2000-memory.dmp

      Filesize

      8KB

    • memory/4488-67-0x000001BC13A10000-0x000001BC13A12000-memory.dmp

      Filesize

      8KB

    • memory/4488-65-0x000001BC138F0000-0x000001BC138F2000-memory.dmp

      Filesize

      8KB

    • memory/4488-61-0x000001BC138B0000-0x000001BC138B2000-memory.dmp

      Filesize

      8KB