Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    299s
  • max time network
    286s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/05/2024, 22:34

General

  • Target

    75e76a6963ddee0a33a9d34d991a9f2346550786e456f9459e857b6473ec7389.exe

  • Size

    896KB

  • MD5

    a4201cc5fdf483f95cfce997bb92beeb

  • SHA1

    2130bb589373f977359fe9cae8746fa1607343ad

  • SHA256

    75e76a6963ddee0a33a9d34d991a9f2346550786e456f9459e857b6473ec7389

  • SHA512

    5ee02e3f2eb538547d796947b32e0c11f709c20a80a428b5f1fab65afb2bd1fd5507550427bcad47a841ca0417b9a145a98c6bcd7fc86eff5b40cf3e2c5a0659

  • SSDEEP

    12288:9qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgasTJL:9qDEvCTbMWu7rQYlBQcBiT6rprG8a8N

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75e76a6963ddee0a33a9d34d991a9f2346550786e456f9459e857b6473ec7389.exe
    "C:\Users\Admin\AppData\Local\Temp\75e76a6963ddee0a33a9d34d991a9f2346550786e456f9459e857b6473ec7389.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4892
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1156
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4556
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1164
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:748
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:3900
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2728
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:5088
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2420
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:1832
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4680
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
      PID:2396
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4848

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V28C7N3J\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\09OE6WBT\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\5OQVNHED\favicon[1].ico

      Filesize

      5KB

      MD5

      f3418a443e7d841097c714d69ec4bcb8

      SHA1

      49263695f6b0cdd72f45cf1b775e660fdc36c606

      SHA256

      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

      SHA512

      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\8NHZP9OR\4Kv5U5b1o3f[1].png

      Filesize

      610B

      MD5

      a81a5e7f71ae4153e6f888f1c92e5e11

      SHA1

      39c3945c30abff65b372a7d8c691178ae9d9eee0

      SHA256

      2bc7a47889c56ad49f1b8b97385d5a4d212e79bb8a9b30df0665a165f58b273e

      SHA512

      1df32349b33f6a6fcb1f8b6093abd737fa0638cdd6e3fd90a7e1852bd0e40bc2633cb4e13c4824fb948d1e012e5cb9eed0b038b121404865495d4e57e123db69

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\2X8U3FR8.cookie

      Filesize

      130B

      MD5

      f9e71368458eb6fe13f9c44342edc7b3

      SHA1

      dd104d427703541497cc15b07d57dd050fa62ac6

      SHA256

      66f98ca9e62905b51117100e53366a9abd1f56c566c2b2b17feb357dbb6b3efb

      SHA512

      8948d4b82de931d64a575c8117ca27123101f89020066a383bed132e33e69c7180348d12533544115413d62f7af77f13138ba9853d0766e4dbf43ec5e746ab4d

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\RIQQ0QA1.cookie

      Filesize

      130B

      MD5

      8bade1129e8f9bc4399b92cc009c29b4

      SHA1

      b75e8092a79efe0140466ddaa8aab6ec083d7234

      SHA256

      40009531201d0f6488cb100e68506564c3fe3b84132f17a716815d3ce6183cde

      SHA512

      845c93e67a9224a2e265425be128b1932847ea60b03bfd89b73557685d7f57d1f9805db7168d8665973a356c365413d764cf68314cf52b7487da9426d5d177c3

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\XEXRWS7B.cookie

      Filesize

      311B

      MD5

      108918c559eaa1f1bb7afd0277bb992c

      SHA1

      b6aa8b9c85ff3545664f9553a7ef1571cfbc06f7

      SHA256

      8ce28ee8bb858e2b6011bcb8a631a7bc72351d6c381ad3226baabace583633a8

      SHA512

      094cdeb0e0eaacebfc3814a413b8ab0e8277f3ebc2b28fcd7834c85fb3d3b028a360751e7d977e4b5983934390ec322b8e7b71af2b308608c21720bc2c31fbd6

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      9ed6fed9b6e5aaa9afcba833c1b8c259

      SHA1

      2ed30daf7f0277a0718b3d9ce46b0658640cc2ba

      SHA256

      c90743b555faf3ed141c4c83e5002c4da6445c3be1ad82b01c98da2201cf6818

      SHA512

      a9abd9ca06479e56d08e1649b344cfd06beec24567d1053616670afd7f47757d7ab186c2cd20d21f53a901ede92b14382fc42ab21df6605d69702c0368106367

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_3CD096171F9FB100FF26D7BE0A4738FB

      Filesize

      471B

      MD5

      a97c0d668c616cd1ead8c12487c2abae

      SHA1

      03a52f7e85b713afec063bc708f6f38f381b6caf

      SHA256

      6724637c09bf89eca29a411e1ca01435f95030c2a71bb50943f77a1443195c56

      SHA512

      1920305f21b1a02f49fd418e89005726eb33b65c10af6b4c29e811c8d42979a2eea8e16946765f86a77ae7f971963c04dad5f5520cdcfc4f3f06ef11dddfcf34

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      724B

      MD5

      ac89a852c2aaa3d389b2d2dd312ad367

      SHA1

      8f421dd6493c61dbda6b839e2debb7b50a20c930

      SHA256

      0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

      SHA512

      c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      9869db58ebb0fab137a3d50ceca1be2a

      SHA1

      661c0a2cf08d24c170b2d68835031473de5af5f1

      SHA256

      9c625f9197a92be48bcbf1d82fb9f3e708903632b6e6a56fa4074002a4c5eb27

      SHA512

      60b7a5b8f1004f53f8d8f2476f3ff0beb6367583a722c0793ad2b6274055187dd75fa4c0503b7747e4e35e9c1ac0694e1520a0742782ed7d545e67a513ef68b2

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      338B

      MD5

      b083b0cd7f860c3882894d51d38b0bec

      SHA1

      d31949e0b65ca2d3dcb2bec40502b8f2ca913a4a

      SHA256

      a49eaa3b65f243a2cdbdac983f32fb84360243acd364bc9f0f67f9ff124e0f4f

      SHA512

      04077b017e91a9ee4bcf02f92c3307f15c007a4e08ffc2180a0f92c194ce3017dfacd806043bf5071761e09f51eba662538b87f966f01dfa959afc8122ca12ff

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_3CD096171F9FB100FF26D7BE0A4738FB

      Filesize

      406B

      MD5

      91869e05b4774c1d19b5749545bf406d

      SHA1

      8904c238c6c243e8131b7eb89073ceefead4e08e

      SHA256

      93d1b5f6c80d253a7222493fc17e214a73f6e9c225a59bd8e9d22d02d489d55b

      SHA512

      061f860eb6909c6f007ce784d55028b8454f70ea65fb96f16d3b54d69800aa3f3736cd19c239a7ca107fd0af9fe869045f37b4ea1628f3c769b8888fcf093b67

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      392B

      MD5

      cbcca9918fb7cefd08258956a1268b2e

      SHA1

      559329eb0fe1f395cafb0b74056a4036ae3c4bb4

      SHA256

      c794cb146f74f5f11a920c6f3a06fe241c8f6253204149abb2f32f4c1725a885

      SHA512

      2b6fb053d7d3273599af3e67d7623f5d5c1dad3d4274cece8f3974c0f78e698e0537e1b51ca389f110a12b7b769a13b312d38e6c8d92316126d138a355d7445e

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      392B

      MD5

      79f56519b27d751fd1d4873208a88312

      SHA1

      47e402ce5a017c00c9fdd7a7a9f6c8aa0d3a4744

      SHA256

      51c80046f00ca23faf863cdb7f375b4ab3068fc3b4f1a42206c7c7ce709684a2

      SHA512

      d2711e6c630299a3a9ee77f98620a1fc39a745f44f24164a2e391efe7593abbc448f773f1e7f553ae80c5d21d1aa89191cc50accaa3f8d6889b3bbe83cde75b5

    • memory/748-47-0x000002B4E8D00000-0x000002B4E8E00000-memory.dmp

      Filesize

      1024KB

    • memory/1156-0-0x0000020DBBF20000-0x0000020DBBF30000-memory.dmp

      Filesize

      64KB

    • memory/1156-16-0x0000020DBC020000-0x0000020DBC030000-memory.dmp

      Filesize

      64KB

    • memory/1156-180-0x0000020DC2880000-0x0000020DC2881000-memory.dmp

      Filesize

      4KB

    • memory/1156-179-0x0000020DC2870000-0x0000020DC2871000-memory.dmp

      Filesize

      4KB

    • memory/1156-35-0x0000020DB93B0000-0x0000020DB93B2000-memory.dmp

      Filesize

      8KB

    • memory/2728-476-0x0000021B543A0000-0x0000021B543A2000-memory.dmp

      Filesize

      8KB

    • memory/2728-478-0x0000021B543C0000-0x0000021B543C2000-memory.dmp

      Filesize

      8KB

    • memory/2728-217-0x0000021B522E0000-0x0000021B52300000-memory.dmp

      Filesize

      128KB

    • memory/2728-238-0x0000021B52880000-0x0000021B52980000-memory.dmp

      Filesize

      1024KB

    • memory/2728-245-0x0000021B51DE0000-0x0000021B51E00000-memory.dmp

      Filesize

      128KB

    • memory/2728-401-0x0000021B53800000-0x0000021B53900000-memory.dmp

      Filesize

      1024KB

    • memory/2728-424-0x0000021B51E90000-0x0000021B51E92000-memory.dmp

      Filesize

      8KB

    • memory/2728-207-0x0000021B52580000-0x0000021B52680000-memory.dmp

      Filesize

      1024KB

    • memory/2728-470-0x0000021B54340000-0x0000021B54342000-memory.dmp

      Filesize

      8KB

    • memory/2728-472-0x0000021B54360000-0x0000021B54362000-memory.dmp

      Filesize

      8KB

    • memory/2728-474-0x0000021B54380000-0x0000021B54382000-memory.dmp

      Filesize

      8KB

    • memory/2728-468-0x0000021B54320000-0x0000021B54322000-memory.dmp

      Filesize

      8KB

    • memory/2728-479-0x0000021B40820000-0x0000021B40830000-memory.dmp

      Filesize

      64KB

    • memory/2728-218-0x0000021B52520000-0x0000021B52540000-memory.dmp

      Filesize

      128KB

    • memory/2728-452-0x0000021B53F80000-0x0000021B53F82000-memory.dmp

      Filesize

      8KB

    • memory/2728-466-0x0000021B54300000-0x0000021B54302000-memory.dmp

      Filesize

      8KB

    • memory/2728-464-0x0000021B542F0000-0x0000021B542F2000-memory.dmp

      Filesize

      8KB

    • memory/2728-458-0x0000021B53F40000-0x0000021B53F42000-memory.dmp

      Filesize

      8KB

    • memory/3900-123-0x000001E938530000-0x000001E938532000-memory.dmp

      Filesize

      8KB

    • memory/3900-126-0x000001E938560000-0x000001E938562000-memory.dmp

      Filesize

      8KB

    • memory/3900-128-0x000001E938570000-0x000001E938572000-memory.dmp

      Filesize

      8KB

    • memory/3900-110-0x000001E925400000-0x000001E925500000-memory.dmp

      Filesize

      1024KB

    • memory/3900-109-0x000001E925400000-0x000001E925500000-memory.dmp

      Filesize

      1024KB

    • memory/5088-101-0x000002D9EE3F0000-0x000002D9EE3F2000-memory.dmp

      Filesize

      8KB

    • memory/5088-103-0x000002D9EE410000-0x000002D9EE412000-memory.dmp

      Filesize

      8KB

    • memory/5088-105-0x000002D9EE5E0000-0x000002D9EE5E2000-memory.dmp

      Filesize

      8KB