Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/04/2024, 16:22

240425-tvp11sce78 1

25/04/2024, 16:21

240425-ttpc4ace59 1

Analysis

  • max time kernel
    1680s
  • max time network
    1685s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2024, 16:22

General

  • Target

    https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwiUut-x4d2FAxV6D6IDHXkTCGQYABAAGgJsZQ&ae=2&gclid=Cj0KCQjw_qexBhCoARIsAFgBlesBUr0ZuVGBuM4CjxjK1wCccOqBLaGsHZzcBnc3QWzzGgSr_V-0d0QaAp9OEALw_wcB&ohost=www.google.com&cid=CAESVeD2ErrZQz7eE_OPZSOIw1ZFgLxZsG61LBT-XbnLstU_GWuEy8abP1P-ebl-DPQnOqg6aRs8Bi6gF4VA3TBOlhsK9iXxBu0lVy60x6UCLmsUvJc9qDY&sig=AOD64_1R0BSAu0DhB5EfzyddoJi3y1TYfg&q&adurl&ved=2ahUKEwi_9dKx4d2FAxWDQvEDHQUFDKgQ0Qx6BAgEEAE

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwiUut-x4d2FAxV6D6IDHXkTCGQYABAAGgJsZQ&ae=2&gclid=Cj0KCQjw_qexBhCoARIsAFgBlesBUr0ZuVGBuM4CjxjK1wCccOqBLaGsHZzcBnc3QWzzGgSr_V-0d0QaAp9OEALw_wcB&ohost=www.google.com&cid=CAESVeD2ErrZQz7eE_OPZSOIw1ZFgLxZsG61LBT-XbnLstU_GWuEy8abP1P-ebl-DPQnOqg6aRs8Bi6gF4VA3TBOlhsK9iXxBu0lVy60x6UCLmsUvJc9qDY&sig=AOD64_1R0BSAu0DhB5EfzyddoJi3y1TYfg&q&adurl&ved=2ahUKEwi_9dKx4d2FAxWDQvEDHQUFDKgQ0Qx6BAgEEAE
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc04346f8,0x7fffc0434708,0x7fffc0434718
      2⤵
        PID:1220
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:2
        2⤵
          PID:1588
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1908
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:8
          2⤵
            PID:668
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
            2⤵
              PID:3468
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:1
              2⤵
                PID:4720
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:1
                2⤵
                  PID:4288
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:8
                  2⤵
                    PID:5028
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3600
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2512 /prefetch:1
                    2⤵
                      PID:3944
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:1
                      2⤵
                        PID:3560
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:1
                        2⤵
                          PID:4488
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:1
                          2⤵
                            PID:3920
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,4758961820709031495,5423282342472775768,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3088
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1900
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2432
                            • C:\Windows\system32\rundll32.exe
                              "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                              1⤵
                                PID:1132
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5828

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                7b56675b54840d86d49bde5a1ff8af6a

                                SHA1

                                fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811

                                SHA256

                                86af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929

                                SHA512

                                11fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                48cff1baabb24706967de3b0d6869906

                                SHA1

                                b0cd54f587cd4c88e60556347930cb76991e6734

                                SHA256

                                f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775

                                SHA512

                                fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                600B

                                MD5

                                bd2b6c50df0bc924f254603163fd8188

                                SHA1

                                f4a0ac57a2190384e0a5a5a619ab26fcc065f5dd

                                SHA256

                                32bbd08e734a0a240a9e0121d750c4238d7cd7558ef45c65d706177dd1021963

                                SHA512

                                cea3ddb18e50fb8107eeeaca081145b1d6eff723b938624cf8703c90e1028fbd4b3a393fe837d89575e331121e826e963125baf9e84a93020e5cc9642baaa301

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                111B

                                MD5

                                285252a2f6327d41eab203dc2f402c67

                                SHA1

                                acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                SHA256

                                5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                SHA512

                                11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                aeeaba5f0d901b356f8634182dd62620

                                SHA1

                                74891e88680c6fbcc8b3a1fab1631c3693ae74dd

                                SHA256

                                6f0e67e6556f3e08f40c24919ca573f459b498ff88abc6a343afc45521b8344b

                                SHA512

                                a7e1422c989334da65df74badce47734dbbaa6fb5de24ccf1b0b11ec337e468e8c03d0ac5aeb9fc4cbc013383849fd7368a0f2c115b4887e2f8289d52bdd5c09

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                e30129c22884ff6bdec6117785cbc78a

                                SHA1

                                3f8a272f0a58e3c65fcdc3956ca44d949e4e5d61

                                SHA256

                                7bf99b44cacb44b7eec7d28cfdda638b35280fc30cf287d4fd99858c40aee151

                                SHA512

                                331f8fd039d55ea22bb2bc9925ed8a28d9362644f12789695ced7e5c51b97a9858e454ec09b4bba323453871468e448726fddc1f0cec451449b65a0b00b131bc

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                e804c9231967026cdcf64a663b3e3aba

                                SHA1

                                f0ff2ec9977b92a7412fccf52fc6f3563945c35c

                                SHA256

                                de481ff5a1f951a3340e5115a1ff226699fd758869a713acc6a96d486dcdb976

                                SHA512

                                31956a3bb1c886e031e9233f9c2efca956650386b30884cdc13552d77f9fb4c108e571c57ef8fbfa78626cbe9685dd45a56a79e21badc2b63944879dedec9763

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                7KB

                                MD5

                                889b970e144fc7d9bce25dc803ff4198

                                SHA1

                                c86a83ce68e12c0c025e672a8cdafb10a9066371

                                SHA256

                                30269e886ede0530fd7682d6af5177980710c295fe4c02ebc7be279493b1d3bd

                                SHA512

                                d5fcab1ca1bb082977d58a439ec25ece760283b78d0633aa7b30d65e4686359054f34f7d6801f07c4caf176cb042ff98711ed49e3e9e90386a63a51312c2b91d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                bee5be50aef31b5a087913ceacc2dc80

                                SHA1

                                18d3df4c0cf3371251165c3e6c7dd4322cc0656c

                                SHA256

                                ec2d35eb1683da8bd68f81b7f561c9a6cb9c53f32eafbca95df9bab02fa74295

                                SHA512

                                f02ce8308a99ac0c8bcebf0be549ff3e4fd81412aa1c26f9cd87486be36e9221c8f97894c8c72847129990cc213a03df195848aef9b65855b24d1999254521cf

                              • memory/5828-195-0x000001CDB4540000-0x000001CDB4550000-memory.dmp

                                Filesize

                                64KB

                              • memory/5828-211-0x000001CDB4640000-0x000001CDB4650000-memory.dmp

                                Filesize

                                64KB

                              • memory/5828-227-0x000001CDBC960000-0x000001CDBC961000-memory.dmp

                                Filesize

                                4KB

                              • memory/5828-229-0x000001CDBC990000-0x000001CDBC991000-memory.dmp

                                Filesize

                                4KB

                              • memory/5828-230-0x000001CDBC990000-0x000001CDBC991000-memory.dmp

                                Filesize

                                4KB

                              • memory/5828-231-0x000001CDBCAC0000-0x000001CDBCAC1000-memory.dmp

                                Filesize

                                4KB