Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    26s
  • max time network
    17s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/06/2024, 20:56

General

  • Target

    https://westernls.odoo.com/mail/view?model=account.move&res_id=148286&access_token=57887a59-26d2-4300-b1ae-ce8e08b4e2da&pid=18883&hash=92b408e6c8ee4d9c7bce139cb05b11b202a56fabdf930591945f0ca6d87503e1

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://westernls.odoo.com/mail/view?model=account.move&res_id=148286&access_token=57887a59-26d2-4300-b1ae-ce8e08b4e2da&pid=18883&hash=92b408e6c8ee4d9c7bce139cb05b11b202a56fabdf930591945f0ca6d87503e1"
    1⤵
      PID:2216
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2976
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4576
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5020
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:856
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\901MWWMO\web.assets_frontend.min[1].css

      Filesize

      792KB

      MD5

      bbf9b50444d6ac787ec344316f7c9d30

      SHA1

      53b0371c3a72feeac9266069b564b883da1748e1

      SHA256

      94a6e2cadc3a931a4bf1c7cbcd0c5093054b2d71ba535c90d1134ab22944cb10

      SHA512

      96fa418c4b15e8da5754e7b0dc6d6d734fdf1a800f718dc03ecb246228fcd1fc4c94d0b0b455a9d819c901b7f109ee59b816b384e75856b4ba300bac74955428

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\901MWWMO\web.assets_frontend_minimal.min[1].js

      Filesize

      26KB

      MD5

      f6087f1e60404fcfcbc625da6fa5f31b

      SHA1

      61265bcd97e940eb297b6751d74a686a8cf9b0b1

      SHA256

      c2454f2f133bd37d9ed8cf35f747f32d7dcd01148033d0ee0bd820116c102be7

      SHA512

      c9d4b5189c189e1e3c9eb6620537a86dbb3e7b7ebf17f3dcbe5150ac4b4b0bcc95366752fa370b368d845aa6842b634c1a81fd88cd615811d80bc5b611389525

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\W7KJ4SZ8\WLS[1]

      Filesize

      1KB

      MD5

      a342fe863a8e41dff2a55410c7f118c5

      SHA1

      2f7028932480cdcb927f83b0165d577669e620fa

      SHA256

      4bd1ab3d744c19286e0676a67eddb7d4a649d690589b7e7ac93c9b5a419db8b0

      SHA512

      348e4e0f22bec1f4a3fcd57b2e5d2414345eea33077539aeb6798f1d8b88aa8904a65b1b97141fb3d45da3a35ea99ff6155f9e8ecb3b11a2ae947d869626f970

    • memory/856-45-0x000001933E900000-0x000001933EA00000-memory.dmp

      Filesize

      1024KB

    • memory/1744-63-0x000001B7966F0000-0x000001B7966F2000-memory.dmp

      Filesize

      8KB

    • memory/1744-89-0x000001B7A74F0000-0x000001B7A74F2000-memory.dmp

      Filesize

      8KB

    • memory/1744-160-0x000001B7A9D70000-0x000001B7A9D72000-memory.dmp

      Filesize

      8KB

    • memory/1744-67-0x000001B797000000-0x000001B797100000-memory.dmp

      Filesize

      1024KB

    • memory/1744-91-0x000001B7AA980000-0x000001B7AA982000-memory.dmp

      Filesize

      8KB

    • memory/1744-97-0x000001B7AA9F0000-0x000001B7AA9F2000-memory.dmp

      Filesize

      8KB

    • memory/1744-99-0x000001B7AAB10000-0x000001B7AAB12000-memory.dmp

      Filesize

      8KB

    • memory/1744-95-0x000001B7AA9D0000-0x000001B7AA9D2000-memory.dmp

      Filesize

      8KB

    • memory/1744-93-0x000001B7AA9B0000-0x000001B7AA9B2000-memory.dmp

      Filesize

      8KB

    • memory/1744-61-0x000001B7966D0000-0x000001B7966D2000-memory.dmp

      Filesize

      8KB

    • memory/1744-121-0x000001B7A71B0000-0x000001B7A71B2000-memory.dmp

      Filesize

      8KB

    • memory/1744-158-0x000001B7A9D60000-0x000001B7A9D62000-memory.dmp

      Filesize

      8KB

    • memory/1744-156-0x000001B7A9D50000-0x000001B7A9D52000-memory.dmp

      Filesize

      8KB

    • memory/1744-58-0x000001B7966A0000-0x000001B7966A2000-memory.dmp

      Filesize

      8KB

    • memory/1744-154-0x000001B7A7140000-0x000001B7A7142000-memory.dmp

      Filesize

      8KB

    • memory/2976-16-0x000002CB2AA20000-0x000002CB2AA30000-memory.dmp

      Filesize

      64KB

    • memory/2976-35-0x000002CB29BE0000-0x000002CB29BE2000-memory.dmp

      Filesize

      8KB

    • memory/2976-134-0x000002CB30F60000-0x000002CB30F61000-memory.dmp

      Filesize

      4KB

    • memory/2976-135-0x000002CB30F70000-0x000002CB30F71000-memory.dmp

      Filesize

      4KB

    • memory/2976-1-0x000002CB2A930000-0x000002CB2A940000-memory.dmp

      Filesize

      64KB