Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17/04/2024, 15:25

General

  • Target

    SophiApp.zip

  • Size

    3.3MB

  • MD5

    499e6e4c950002919508027066fc2615

  • SHA1

    6d49f4f793c87ed1498e4a23888d025118109a18

  • SHA256

    621226b572dcaa91d44e36450f82fcf28fce052dff5770d50b3f628987f59291

  • SHA512

    700ddedb488335abe4bb834d5046c4de6f95e344be361c5ece868598e0178b0e11b3e461c2979f219eb7bb978fe9487e1bb95317f9d9c3590a52f9f2c6b24a67

  • SSDEEP

    98304:yVWwc1nmWVIazWWgRsjBGsGuAZ6FzmpU2:yo515RWxoELZW2

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Enumerates system info in registry 2 TTPs 13 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\SophiApp.zip
    1⤵
      PID:3556
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:428
      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
        1⤵
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:8
      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
        1⤵
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2972
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff93be9ab58,0x7ff93be9ab68,0x7ff93be9ab78
          2⤵
            PID:1880
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1512 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:2
            2⤵
              PID:2344
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:8
              2⤵
                PID:4928
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2080 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:8
                2⤵
                  PID:4916
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2720 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:1
                  2⤵
                    PID:1496
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2728 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:1
                    2⤵
                      PID:1192
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3716 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:1
                      2⤵
                        PID:4240
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4316 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:8
                        2⤵
                          PID:3836
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4468 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:8
                          2⤵
                            PID:4600
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4368 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:8
                            2⤵
                              PID:3576
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:8
                              2⤵
                                PID:5048
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:8
                                2⤵
                                  PID:2812
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4696 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:1
                                  2⤵
                                    PID:4616
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5068 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:1
                                    2⤵
                                      PID:3460
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4372 --field-trial-handle=1808,i,5152604010638807713,4559755910853332334,131072 /prefetch:2
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1088
                                  • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                    1⤵
                                      PID:764
                                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                                      1⤵
                                      • Enumerates system info in registry
                                      • Modifies Internet Explorer settings
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5008
                                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                                      1⤵
                                      • Enumerates system info in registry
                                      • Modifies Internet Explorer settings
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1316
                                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                                      1⤵
                                      • Enumerates system info in registry
                                      • Modifies Internet Explorer settings
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1468

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      2KB

                                      MD5

                                      556928a5f73751dcdbb15f8911bb111e

                                      SHA1

                                      a1574ec88aeadb10291e42806fb34538da3f99bc

                                      SHA256

                                      498b89682215bf7ed7af594e370859e6de89ec1c5b386c6ae9ffa76cb75536eb

                                      SHA512

                                      9ceae4b97f23469a2f6548a67aa7fa2371e0d86e143bc3ff1207ca7bc49055c6c83e7cec35279547ea8b60a593178dca29d478899ee2224a8055914c4f0db8ea

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      2KB

                                      MD5

                                      575c37100ff94338467c7698ab37cd44

                                      SHA1

                                      ed0085cd343f1a9fc6ef8097d5581058fadc9940

                                      SHA256

                                      d1cee572b928f536471330f96a235cb006b7baaf88a3aa541516d5e3c4220348

                                      SHA512

                                      6bc6f7d7e564df8b64cb1f3646bbee8ba8826cc1436062186f697d11a3783249e6fea824f7c193f30fd077216424d9941256da840045dd4481c69099fa577133

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                      Filesize

                                      2B

                                      MD5

                                      d751713988987e9331980363e24189ce

                                      SHA1

                                      97d170e1550eee4afc0af065b78cda302a97674c

                                      SHA256

                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                      SHA512

                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      d6f95fca4aa5abb8af780fbd670be3a7

                                      SHA1

                                      fb7b5f34cb91bd0ed1cab0567f51ccf899649b20

                                      SHA256

                                      e480b9a0a4e58baac200083afe36b0751c314924c610d060956a75971f87aa89

                                      SHA512

                                      e0c0ba65a8a3a1e79f1f386beed6c5bb242f5798a111b27ac54331478ad8c1c8721c903ba290ee4add746f63d29afe54398a9f91aa8d8ab9202090f38a524a8d

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      f3f5a2a5ee3c9e34b166d8e3fae513a6

                                      SHA1

                                      7b713933f76b50084ad3b198d94907e6700db09c

                                      SHA256

                                      997e39441332889a2f338c08ed17a277d25e5e5ed5907be646f9ff76c2eddfb0

                                      SHA512

                                      fb407741edcabb0b5b542f6f23542b8e986da73a8500705a1dd35a839954670a585c3f40fbcff80294bf749a1c53a76413c14da4adc253ced6052833bf0507be

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      356B

                                      MD5

                                      1671cc99fb6c785069a0012d5965f445

                                      SHA1

                                      f9121165855a6aec25dceed63c8c837191580f4e

                                      SHA256

                                      9fe02eed8bc4db22cea8358696b13f6fa6773a19831a0c1579d85aeeb9cb9a9a

                                      SHA512

                                      631cf156cdeb006f57434d2bca1e97a5f26c3d85e97c94b62facd9bd9d4eb5d782b91bf52fcec634dc5f7002e3d34998f6041d431d6c7229aa8dd62aa30b1d3f

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      4b0ae8bd00232d15a18aba3fe69334cd

                                      SHA1

                                      939cb48b72ffa48edfa6cba1c84ea4d47c167b33

                                      SHA256

                                      c77fa639186e191b039526eec2c152bd6a974a798701ea01cc624ccb3b1dfc72

                                      SHA512

                                      cbd2fa22619ec509d23fa9d6ceb3d99aa8389bbbf64a406b4ce2f7cfb9df04425f21f7bba7f9b66a4955a08a74fcad398a6a947241ec1c1c8a3c1098c3f84501

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      7KB

                                      MD5

                                      f8740823c9c7fe4a8b036146815717fd

                                      SHA1

                                      720a0b1618a1fb292f480535a0e4ffb82b7452e0

                                      SHA256

                                      f90a6a140d7c6c2e514d805928609541a6d5054ae6d21f63f9954a4d7badef30

                                      SHA512

                                      ef6a3af79ea9d584ac807cba21f4b38f1c6f70e6ffcc87030160a4e81623a0eb38d207799ff092a66af754e0fd8afd42183d5475614a6dc671454c23a1209096

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                      Filesize

                                      16KB

                                      MD5

                                      d4cb05cd316d2b1a806f738f85bc851e

                                      SHA1

                                      8e67c07442ff121744cda5ccd955a72001bbe330

                                      SHA256

                                      9b300282cf1d41bb03d6f25249822d6190a9c8911b515c1922e00abcbe2a2b77

                                      SHA512

                                      564d4bbedf16cf1fbe058c84209fb6944d1d7e21c8e1dc22702f3a36655bf6dbce73dcd79c7032694ebe4c19c442bfdab2351d7c0bc2990e900eda73ab45a964

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      251KB

                                      MD5

                                      4646ac62681b54037d02cc49164c8fa1

                                      SHA1

                                      cb898748ac314a78e1ce9944789088a2020eabf0

                                      SHA256

                                      8f99228b3d69bda27460eb0a09a295a81d95495bbea35f8fa9246617707b4bac

                                      SHA512

                                      28f830d48e2533100992f092fa55b696735dd0438903dda8085d3cc0f2b7742e4639d742e1d35f9e9569c695daf98373e382b3054f390caa98eeb59765e6d1e7

                                    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\ServiceWorkerFiles\7270B404-F91C-498C-B7A8-BE547AA3F311\Zrtu2hQ08VU_1.bytecode

                                      Filesize

                                      62KB

                                      MD5

                                      dc9f6a20504cef0cfcd0dd9e0a3f4746

                                      SHA1

                                      0984becd8d0be854e8a8654bbec5e8a164855d3d

                                      SHA256

                                      92b952bd0867c570af340dba400c3c0002809c379154f212a197438d17a2b0e6

                                      SHA512

                                      dda3a07c9561e57deb77aef691ac8ac8c9436265323de69228c28e609e323fb927501f9eb48d5b16a1529d0b2d751903df5ce8e710694a83eb80ad2d6825ce5b

                                    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\ServiceWorkerFiles\7270B404-F91C-498C-B7A8-BE547AA3F311\Zrtu2hQ08VU_1.metadata

                                      Filesize

                                      192B

                                      MD5

                                      980789fe21d60f9a3c0450adf692d2e0

                                      SHA1

                                      355b1df23bf019f85279245ac1caa159cabc5cda

                                      SHA256

                                      3f9f7801d8cc634bad95a35c33163f948e6e3b18fd9d4230021aef769e1b96f5

                                      SHA512

                                      c555fc95b4727302181e29dbe0575c4b19d21ab00da2bb31e87cd2dd3edb5bae9060fd1618d8520be6b515a587a6f63f22076db6be8089903259c1635b60fdb7

                                    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\XOSSWS1G\s13bmMn_O0leWsDgDXskAu2MbjY.br[2].js

                                      Filesize

                                      20KB

                                      MD5

                                      9e527b91c2d8b31b0017b76049b5e4e3

                                      SHA1

                                      86bc98423492c4ceb41277298277edbd217e2d3a

                                      SHA256

                                      38edf0f961c1ccb287880b88f12f370775fc65b2e28227eee215e849cdbe9bbc

                                      SHA512

                                      4c19a7633ea4042a5c19b0f9e4aedfe0b67eca49f7a30aae8c59d489348712da3a84c03b695e16ed50cfbe5a838d0226bd930ac6847474d6398a7ca1c5f65b98

                                    • memory/1468-160-0x000002346A760000-0x000002346A860000-memory.dmp

                                      Filesize

                                      1024KB

                                    • memory/2972-54-0x000002177A5B0000-0x000002177A6B0000-memory.dmp

                                      Filesize

                                      1024KB

                                    • memory/2972-42-0x000002177A340000-0x000002177A360000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2972-39-0x0000021779840000-0x0000021779940000-memory.dmp

                                      Filesize

                                      1024KB