Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/03/2024, 10:42

240305-mrwwtsch4s 7

Analysis

  • max time kernel
    270s
  • max time network
    271s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 10:42

General

  • Target

    KRONIXSOLUTIONS13.7 (1).exe

  • Size

    17.9MB

  • MD5

    8baaed45a4d308f92b4725e8dfd78fe8

  • SHA1

    62afbbe77c50e78e97d20adc1211918b24baa799

  • SHA256

    09254fb784b07fad9ac534fe4908cdb88794254889982cfce6672b479bca0f83

  • SHA512

    d5e80401f6a9a03199c87121f867cae751df93635fdb05de45eefb62921f996928a98c5de90ddc42b7604b6317b74f9da7701d0b59439c5605135457a7b9cf32

  • SSDEEP

    393216:vl3OSNCRwvSx4vKskvYNR2hgQ3ieD+UQBcHBJvjYNtlFNxg5:NejqSmizrAcH7jUFNxu

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KRONIXSOLUTIONS13.7 (1).exe
    "C:\Users\Admin\AppData\Local\Temp\KRONIXSOLUTIONS13.7 (1).exe"
    1⤵
    • Checks BIOS information in registry
    PID:1956
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2012
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Recently.docx" /o ""
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1592
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaulte93c8143h2937h446dhadf6h634a37ee5121
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffeec4846f8,0x7ffeec484708,0x7ffeec484718
        2⤵
          PID:212
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,13403140289378442086,13073305710853755183,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
          2⤵
            PID:5296
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,13403140289378442086,13073305710853755183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:5304
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,13403140289378442086,13073305710853755183,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:8
            2⤵
              PID:5348
          • C:\Windows\System32\CompPkgSrv.exe
            C:\Windows\System32\CompPkgSrv.exe -Embedding
            1⤵
              PID:5560
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:5592
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault2f40c005heab3h4626h9af4h72633d6fd9d9
                1⤵
                  PID:5600
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffeec4846f8,0x7ffeec484708,0x7ffeec484718
                    2⤵
                      PID:5632
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4045196747484660993,7450018828457927300,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
                      2⤵
                        PID:1792
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4045196747484660993,7450018828457927300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:3
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5524
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4045196747484660993,7450018828457927300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:8
                        2⤵
                          PID:5244
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:1900
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:5796

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            f35bb0615bb9816f562b83304e456294

                            SHA1

                            1049e2bd3e1bbb4cea572467d7c4a96648659cb4

                            SHA256

                            05e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71

                            SHA512

                            db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            1eb86108cb8f5a956fdf48efbd5d06fe

                            SHA1

                            7b2b299f753798e4891df2d9cbf30f94b39ef924

                            SHA256

                            1b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40

                            SHA512

                            e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG

                            Filesize

                            334B

                            MD5

                            facfafe77c98533dc34513789fdede8d

                            SHA1

                            410a3d4ef0ab165e7e170eb0dc7d20a5d3313561

                            SHA256

                            165fadf6281c065c046619e474036f20ed29396e544c5746fed428f4564e98b6

                            SHA512

                            c32fbcb5cd35d0cf15f15a7bec7840da9b196941abac28a36eb1c0f4c5f753a9217814cb9f6548c3f79f66f91786d4a565e8ff905502e7401a1995855e5eb831

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                            Filesize

                            61B

                            MD5

                            4df4574bfbb7e0b0bc56c2c9b12b6c47

                            SHA1

                            81efcbd3e3da8221444a21f45305af6fa4b71907

                            SHA256

                            e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377

                            SHA512

                            78b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            7edd684c50146f2793d28f3f76f77f26

                            SHA1

                            a7b3027cb1997a191a9ff39054c2611f53a0dce4

                            SHA256

                            a8fce1b7ed0d0198a329bb506d412bf78502b93f4ff65807cb53d6bf43713fcc

                            SHA512

                            08a5609e313a92703f507aa8bf9b93699658f66b0cc618e3f2289baffb36a59189aab919d824112a8932f86d5fb072577968afeb7048c6233f66f76636161e38

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG

                            Filesize

                            350B

                            MD5

                            69cf7c91b140960739ccea7496ac0531

                            SHA1

                            dea5fb9d8102fa8992e452a1316d774c1f88e52d

                            SHA256

                            61b130cba82ae7e86c7d1eddeeb9a4742605aadc21507221a014a06d3c1a7eba

                            SHA512

                            a54c36312a939841459b4af14be8bcad893ee4b5903dea859452c6bf75eb12779595ab3bed585f74d2fe79f0365665b05fe99755ad749a8e06099aee47d7a5b3

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG

                            Filesize

                            326B

                            MD5

                            dc8dc93c5ede688630537eae0253b846

                            SHA1

                            23a95ad93e5b1c52e685a8985ce208e695b52d9a

                            SHA256

                            bbeb0168a6c0f1b3cc3895133c595f05015db295f552d550f271a8308ed2b4dd

                            SHA512

                            5809a35f611cadf65ef3b7ca7e7840ce7e7a736c7b0c6d205620f8ca211b696108602b4a851335943a2175ae50b8594ec51f3f1c098393699eba39837e64ee7b

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                            Filesize

                            11B

                            MD5

                            838a7b32aefb618130392bc7d006aa2e

                            SHA1

                            5159e0f18c9e68f0e75e2239875aa994847b8290

                            SHA256

                            ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                            SHA512

                            9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            8KB

                            MD5

                            b503f2da7d7d9e0ed0097a1cb14c2162

                            SHA1

                            b8bdec178830866cc9e60e9770b316a76ee94208

                            SHA256

                            f7d120c1b16382627964e7fe4239f2abc7f6c7d9cb93e15f7f52cb0f2797f960

                            SHA512

                            a583ffa761594578c1d92400a3ba1aedff4d00937bf93bfef2bf61e32e4fef93e7086cf442abd1fa10a67c8347f9fa57b1bd7e9796ab43ceaff1ada1bbbca860

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                            Filesize

                            264KB

                            MD5

                            f50f89a0a91564d0b8a211f8921aa7de

                            SHA1

                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                            SHA256

                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                            SHA512

                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                            Filesize

                            202B

                            MD5

                            8e56ace3e1a321219fb91f6a902cbf3f

                            SHA1

                            a891636695dbd8ebe582bada0a821c0b0b2c5ffe

                            SHA256

                            8f87addb7d39c9cbbc86110d8f6eb08a97fa9402a82054f241b3901ba0afc9e8

                            SHA512

                            79f346ef5cfd4779430b472c80d1e2fb585cd944e9b83c55f18badd8b1cf697e84a4054bb31fe46fa08b2ad00cef2c0bcab5be4f20ef19d925172bce0c8fb8ba

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                            Filesize

                            3KB

                            MD5

                            a45cdfdded788b62e0cdfa2f6eea0921

                            SHA1

                            cd53c2eb054696e17b042d6dfe0e3f93820a834e

                            SHA256

                            13f8f5dc85615e94dcc290fa1a6224636f964aced467cf4d0f7ebf3ad9843787

                            SHA512

                            024e0fd18d28a2a8f921612c4765e94213268479d1d274d720ee0748928159e663d0647a634222e29f7ac1cab0a9c0f4d20a2d6dc3c9581ec526c913aa2e8cb5

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                            Filesize

                            3KB

                            MD5

                            fefea9a2cf859d1a52da5344724ed2c0

                            SHA1

                            0512a5822879f0a08400a957a8ae82e021034164

                            SHA256

                            076a09df8e46d470d3b227e829af7c2b851e9318939e8edd7333aca08c3dc07f

                            SHA512

                            924e68c49e1d5496fedf7f9e7761d0bbbe702b8c20ed2222ec2fe1bee8252748613a358645ae0d8180efb7054ddc502cb1d902961138088b3b84f4f721d5bfc6

                          • memory/1592-10-0x00007FFED5A90000-0x00007FFED5AA0000-memory.dmp

                            Filesize

                            64KB

                          • memory/1592-57-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-16-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-18-0x00007FFED3130000-0x00007FFED3140000-memory.dmp

                            Filesize

                            64KB

                          • memory/1592-19-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-17-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-20-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-22-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-21-0x00007FFED3130000-0x00007FFED3140000-memory.dmp

                            Filesize

                            64KB

                          • memory/1592-23-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-14-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-13-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-12-0x00007FFED5A90000-0x00007FFED5AA0000-memory.dmp

                            Filesize

                            64KB

                          • memory/1592-15-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-58-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-59-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-11-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-4-0x00007FFED5A90000-0x00007FFED5AA0000-memory.dmp

                            Filesize

                            64KB

                          • memory/1592-8-0x00007FFED5A90000-0x00007FFED5AA0000-memory.dmp

                            Filesize

                            64KB

                          • memory/1592-6-0x00007FFED5A90000-0x00007FFED5AA0000-memory.dmp

                            Filesize

                            64KB

                          • memory/1592-7-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-9-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1592-5-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1956-0-0x00007FF747590000-0x00007FF74877D000-memory.dmp

                            Filesize

                            17.9MB

                          • memory/1956-3-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1956-2-0x00007FF747590000-0x00007FF74877D000-memory.dmp

                            Filesize

                            17.9MB

                          • memory/1956-1-0x00007FFF15A10000-0x00007FFF15C05000-memory.dmp

                            Filesize

                            2.0MB