Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
05/03/2024, 10:42
240305-mrwwtsch4s 7Analysis
-
max time kernel
270s -
max time network
271s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
KRONIXSOLUTIONS13.7 (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
KRONIXSOLUTIONS13.7 (1).exe
Resource
win10v2004-20240226-en
General
-
Target
KRONIXSOLUTIONS13.7 (1).exe
-
Size
17.9MB
-
MD5
8baaed45a4d308f92b4725e8dfd78fe8
-
SHA1
62afbbe77c50e78e97d20adc1211918b24baa799
-
SHA256
09254fb784b07fad9ac534fe4908cdb88794254889982cfce6672b479bca0f83
-
SHA512
d5e80401f6a9a03199c87121f867cae751df93635fdb05de45eefb62921f996928a98c5de90ddc42b7604b6317b74f9da7701d0b59439c5605135457a7b9cf32
-
SSDEEP
393216:vl3OSNCRwvSx4vKskvYNR2hgQ3ieD+UQBcHBJvjYNtlFNxg5:NejqSmizrAcH7jUFNxu
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion KRONIXSOLUTIONS13.7 (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion KRONIXSOLUTIONS13.7 (1).exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1592 WINWORD.EXE 1592 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5304 msedge.exe 5304 msedge.exe 5524 msedge.exe 5524 msedge.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE 1592 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 212 2900 msedge.exe 133 PID 2900 wrote to memory of 212 2900 msedge.exe 133 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5296 2900 msedge.exe 134 PID 2900 wrote to memory of 5304 2900 msedge.exe 135 PID 2900 wrote to memory of 5304 2900 msedge.exe 135 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136 PID 2900 wrote to memory of 5348 2900 msedge.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\KRONIXSOLUTIONS13.7 (1).exe"C:\Users\Admin\AppData\Local\Temp\KRONIXSOLUTIONS13.7 (1).exe"1⤵
- Checks BIOS information in registry
PID:1956
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2012
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Recently.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaulte93c8143h2937h446dhadf6h634a37ee51211⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffeec4846f8,0x7ffeec484708,0x7ffeec4847182⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,13403140289378442086,13073305710853755183,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,13403140289378442086,13073305710853755183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,13403140289378442086,13073305710853755183,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:5348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault2f40c005heab3h4626h9af4h72633d6fd9d91⤵PID:5600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffeec4846f8,0x7ffeec484708,0x7ffeec4847182⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4045196747484660993,7450018828457927300,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4045196747484660993,7450018828457927300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4045196747484660993,7450018828457927300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:5244
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
334B
MD5facfafe77c98533dc34513789fdede8d
SHA1410a3d4ef0ab165e7e170eb0dc7d20a5d3313561
SHA256165fadf6281c065c046619e474036f20ed29396e544c5746fed428f4564e98b6
SHA512c32fbcb5cd35d0cf15f15a7bec7840da9b196941abac28a36eb1c0f4c5f753a9217814cb9f6548c3f79f66f91786d4a565e8ff905502e7401a1995855e5eb831
-
Filesize
61B
MD54df4574bfbb7e0b0bc56c2c9b12b6c47
SHA181efcbd3e3da8221444a21f45305af6fa4b71907
SHA256e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377
SHA51278b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a
-
Filesize
6KB
MD57edd684c50146f2793d28f3f76f77f26
SHA1a7b3027cb1997a191a9ff39054c2611f53a0dce4
SHA256a8fce1b7ed0d0198a329bb506d412bf78502b93f4ff65807cb53d6bf43713fcc
SHA51208a5609e313a92703f507aa8bf9b93699658f66b0cc618e3f2289baffb36a59189aab919d824112a8932f86d5fb072577968afeb7048c6233f66f76636161e38
-
Filesize
350B
MD569cf7c91b140960739ccea7496ac0531
SHA1dea5fb9d8102fa8992e452a1316d774c1f88e52d
SHA25661b130cba82ae7e86c7d1eddeeb9a4742605aadc21507221a014a06d3c1a7eba
SHA512a54c36312a939841459b4af14be8bcad893ee4b5903dea859452c6bf75eb12779595ab3bed585f74d2fe79f0365665b05fe99755ad749a8e06099aee47d7a5b3
-
Filesize
326B
MD5dc8dc93c5ede688630537eae0253b846
SHA123a95ad93e5b1c52e685a8985ce208e695b52d9a
SHA256bbeb0168a6c0f1b3cc3895133c595f05015db295f552d550f271a8308ed2b4dd
SHA5125809a35f611cadf65ef3b7ca7e7840ce7e7a736c7b0c6d205620f8ca211b696108602b4a851335943a2175ae50b8594ec51f3f1c098393699eba39837e64ee7b
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
8KB
MD5b503f2da7d7d9e0ed0097a1cb14c2162
SHA1b8bdec178830866cc9e60e9770b316a76ee94208
SHA256f7d120c1b16382627964e7fe4239f2abc7f6c7d9cb93e15f7f52cb0f2797f960
SHA512a583ffa761594578c1d92400a3ba1aedff4d00937bf93bfef2bf61e32e4fef93e7086cf442abd1fa10a67c8347f9fa57b1bd7e9796ab43ceaff1ada1bbbca860
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
202B
MD58e56ace3e1a321219fb91f6a902cbf3f
SHA1a891636695dbd8ebe582bada0a821c0b0b2c5ffe
SHA2568f87addb7d39c9cbbc86110d8f6eb08a97fa9402a82054f241b3901ba0afc9e8
SHA51279f346ef5cfd4779430b472c80d1e2fb585cd944e9b83c55f18badd8b1cf697e84a4054bb31fe46fa08b2ad00cef2c0bcab5be4f20ef19d925172bce0c8fb8ba
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5a45cdfdded788b62e0cdfa2f6eea0921
SHA1cd53c2eb054696e17b042d6dfe0e3f93820a834e
SHA25613f8f5dc85615e94dcc290fa1a6224636f964aced467cf4d0f7ebf3ad9843787
SHA512024e0fd18d28a2a8f921612c4765e94213268479d1d274d720ee0748928159e663d0647a634222e29f7ac1cab0a9c0f4d20a2d6dc3c9581ec526c913aa2e8cb5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5fefea9a2cf859d1a52da5344724ed2c0
SHA10512a5822879f0a08400a957a8ae82e021034164
SHA256076a09df8e46d470d3b227e829af7c2b851e9318939e8edd7333aca08c3dc07f
SHA512924e68c49e1d5496fedf7f9e7761d0bbbe702b8c20ed2222ec2fe1bee8252748613a358645ae0d8180efb7054ddc502cb1d902961138088b3b84f4f721d5bfc6