Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/04/2024, 20:25

240418-y7llksfb61 7

18/04/2024, 20:23

240418-y6dvcafb3z 7

18/04/2024, 20:21

240418-y5cwnadh36 6

18/04/2024, 20:18

240418-y3rxssfa7s 6

18/04/2024, 20:16

240418-y169psdg36 6

18/04/2024, 20:12

240418-yy98ksdf74 6

Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18/04/2024, 20:16

General

  • Target

    https://github.com/enforcer-pro/ddostor

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/enforcer-pro/ddostor
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffae8653cb8,0x7ffae8653cc8,0x7ffae8653cd8
      2⤵
        PID:2132
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
        2⤵
          PID:2444
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1920 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4896
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:8
          2⤵
            PID:2392
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
            2⤵
              PID:2076
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
              2⤵
                PID:724
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2600
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:1
                2⤵
                  PID:1616
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:1
                  2⤵
                    PID:5052
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3584
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                    2⤵
                      PID:728
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:1
                      2⤵
                        PID:488
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2408 /prefetch:1
                        2⤵
                          PID:3100
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 /prefetch:8
                          2⤵
                          • NTFS ADS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:248
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,9729880719228640990,5731831300874257202,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4848 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:780
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:1512
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:5008
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:3276
                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                              1⤵
                              • Suspicious use of SetWindowsHookEx
                              PID:5052

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              57e5c5a9236321d336e2c8ce1eeff844

                              SHA1

                              8fd4288af72ba3f7a0ecc5583a9265723fefc096

                              SHA256

                              ae6496cf397848bf3139858deaf567e3df991bab5a7704a0fa7aae95474872d7

                              SHA512

                              bc3f24afe6ce0494022d8201a01a60239ac5cfee54e0650a337036817056424b418cb636d58d07e5034dffe2226906202b56509e4cc07562c0b60f618c420080

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              493e7e14aceba0ff1c0720920cccc4a2

                              SHA1

                              468f39cefbcf14a04388b72d4f02552649bf3101

                              SHA256

                              a0dd32ed60115f661a4ca537472e0d4e230ff844d56a3db766299cf4cd817842

                              SHA512

                              e16c748e4513ea10bf7124cef7b50dc5f3a1802205af9228e0c33fdbf3c24286739db08db4b813079ed7cc36be43d7457f4c26f00ae3126a2fafd77d2696107a

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              1KB

                              MD5

                              7c0c3f5c2c2ee2987020bc22bce37fe5

                              SHA1

                              c5234d1b8b753eb2ce583fdb838b1afb1d1c36a8

                              SHA256

                              5399654f692018cff2cffe9f8c3ec299c44e94cc8d25b82c575b9940207b7756

                              SHA512

                              b08e6bd45391c55e36a72ab5a7f4a95f5b3ed5ee4d0f0bcc66d8877389ebb506180a374d406b85109b1e5fb421cd917648eea5d9c74ed95f0c06b8f057a92f5c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              748B

                              MD5

                              f0757d87b17b8bfb312aa867a442f972

                              SHA1

                              c75924b0cfdd288ff2fbabf766986a229b14788a

                              SHA256

                              c3f69f61f4ea8497ff5a22cc97b76df8775bba71a7a0a7b7c40cf27287950f49

                              SHA512

                              0bca2af18f3e2ee7d9e68388db78a9de65fae9ec1f1520b7cd0f6009f1298965ae209d767b89c421e4009ce09e950a8d6e6ac824cd62b5be9abdfbc320686574

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              ccfe41bf0582638fc53189e97e98e477

                              SHA1

                              fc3dc45dd3025474412c50c35ff370c4b525d332

                              SHA256

                              ce736404c618d015e93cfca0d3dcb6cb1dd05acb5e1e63adf7ee7ff5e4d20a56

                              SHA512

                              93e56c56b829f6bef32dc2bbb0bc85c0a67e6da9c1b39a30e6609993382ccefac485fbe109a2930683387cb6783bedc2d6d9b69c0b420ca6ad9e1be7f3643cb1

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              3082bdcba0d2217392678544a323d59a

                              SHA1

                              c242bbdaa469caa8ae4fefa8dacd7d224e8dbfd5

                              SHA256

                              fa8245e3bfb2421c16c13c14493794ad0cc1fe9d44afd05f5ad7dba04612e641

                              SHA512

                              09ccc1e3a2802086071fa793f1a965574870ec81c563dbc9583adcd6fad5480bf40f6663c241446b58a340812ed187e9d92f8dd084f783108a5c544737a7749c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              dc9b8fea4349df26eac25ec926632fee

                              SHA1

                              b386af8403beab20eea8126bff36eaba1d282b58

                              SHA256

                              78c118d00af1f64dcefd868bd421848aaa830ae8d8f4baadb58bb42fd5609b50

                              SHA512

                              bd809202b83a2524cb3fa281f359ee7d970fa9285d99f68f4063b446f9cb023f4c48f7f52c7705433a09b808bef4908f37934d315c97a16f0dbe6314877d7730

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              a1453723ff49636b64f65c15626408d0

                              SHA1

                              d685d7161bb9372e0b22717f9c539c7487ca6e69

                              SHA256

                              10392eabf5d67be03222823569402c323afa6559dc53ba3f30d6d261bb054831

                              SHA512

                              d6e0adab128f6c8f96ef003690aaededea7d2ec8f3d7ffbcd147f9d8e77922540298fa54caf8fd68a21bc6aaa56e9e6b71fa2273180f9c33d1c62bcd0045de3a

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57d68a.TMP

                              Filesize

                              1KB

                              MD5

                              5728844153678b141b7212f40a2bbb89

                              SHA1

                              bdaf33db76c5bd2f5f3a0bc83e496294df4556e4

                              SHA256

                              c703d183008a8b08956b3df93a566c08c60b543121357afc2de5970ec0037064

                              SHA512

                              a9ceff8756d13648af1daba7f7b12f001659bf18d0bbda40cd4ae57c9e20591c9dce1c4614f649e0ba5afa53de42580779408a7b1d14fc636f7b27bd0569a7d8

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              966dd90ef9e6d9e6037928f3ca57946a

                              SHA1

                              ccf2e2aa8f3824819d6116bb58e797527cd83bc4

                              SHA256

                              07562c0f62411a9f54795027772e95d7f18ff4ae3ea1c68891f07a88d001b1f4

                              SHA512

                              19e1a10fd9fa487a59827ae603a26dd02d49d682eeeb020b059305176a79f69b8813b9083d12d69423fb3158b321d9475e89a304b9f1288b4453ffe36403ed34

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\fc05f90c-05eb-4bdb-9a0a-d0292d4be4f6.tmp

                              Filesize

                              11KB

                              MD5

                              5b1cf666317a5827062419a4355fcba7

                              SHA1

                              26e0dc2eb8c94e215a8cb9e61d0d750f5201b58f

                              SHA256

                              848a44da4bbd2a60ac9fdcddec2be926675f3dcbbb5053423124b43f96b868af

                              SHA512

                              87fbce800bcb1c4ee7e664aee618b7793445867cb4680911c5d32c68ed4711623faba6df6f87e839eec863634679e5e8ed7cb6ca234e1e57419d49b5b19941b9

                            • C:\Users\Admin\Downloads\ddostor-master.zip

                              Filesize

                              23KB

                              MD5

                              644f98d440c23deb8a7b4b29be4c8aa0

                              SHA1

                              be93c232c37066c42dd015fd858691a35e3d4c48

                              SHA256

                              e50931ba3cffdbd98d393b33a879fec9298708930203812dde5aaa066b5ada61

                              SHA512

                              4a6c5b9160dad154318db7e8956313598c0dbddda4732028fc1ff080dc2e3e37d67fc299e0d90158dfd996cb362e2a0ac274314d730cc2fc80ae0dfb7362e6bc

                            • C:\Users\Admin\Downloads\ddostor-master.zip:Zone.Identifier

                              Filesize

                              159B

                              MD5

                              b244e68d4e240576fed718d67db12eb9

                              SHA1

                              2f485863c4f4525a59bed06a0adac04b8db8845c

                              SHA256

                              504bf7a8549720a309d87b8bfda1d60931ed2df98f64e666057fea49bb1f2a0b

                              SHA512

                              780b2ca10c3ab28a54a496026cc1f6b1cb8f88af9a8055edc4ce9dc2eed7011f9507d7d403e97a40619e7526a95a1bb0c4a5c8585660d30ab9aba0362c9ec59e