Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 05:54

General

  • Target

    2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe

  • Size

    11.7MB

  • MD5

    d742a20ae5bace7b2685c26fecd0bc66

  • SHA1

    4bb1418db663a9f69da2c8089d9a6bbb487ec5e6

  • SHA256

    84f41a3516629d92f2dbd7bc287dd61db2a8992da3edc0982db9002eef4043fb

  • SHA512

    9acbace2aa1bf805ea7dca7f7f7ff7a660beca83f95051360cb6951cbaf0eb7a37d7adaa7ea671902c991133bdbfaa93c1d8710b5a4d00709c2c2b514a39991e

  • SSDEEP

    98304:np/GsFKjdfMliYEDuKZ4N2tTIQfQVqgO+E5Cuen3TjUh:np/Ku3QfV5pe3T8

Score
9/10

Malware Config

Signatures

  • Detects executables containing bas64 encoded gzip files 13 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-06_d742a20ae5bace7b2685c26fecd0bc66_snatch.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\.mysterium-bin\myst.exe
      C:\Users\Admin\.mysterium-bin\myst.exe --userspace --launcher.ver=1.0.49/windows --config-dir=C:\Users\Admin\.mysterium-node --data-dir=C:\Users\Admin\.mysterium-node --log-dir=C:\Users\Admin\.mysterium-node --node-ui-dir=C:\Users\Admin\.mysterium-node/nodeui service --agreed-terms-and-conditions
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:4268
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://localhost:4449/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4528
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x100,0x128,0x7fff674d46f8,0x7fff674d4708,0x7fff674d4718
        3⤵
          PID:5024
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
          3⤵
            PID:4256
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3752
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:8
            3⤵
              PID:4336
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
              3⤵
                PID:4188
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                3⤵
                  PID:3972
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:8
                  3⤵
                    PID:4820
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1096
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:1
                    3⤵
                      PID:5092
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
                      3⤵
                        PID:3192
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                        3⤵
                          PID:1672
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                          3⤵
                            PID:5040
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9759381749484445914,7309678096576275829,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1288 /prefetch:2
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4300
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:4856
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2852

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\.mysterium-bin\myst.exe

                            Filesize

                            48.3MB

                            MD5

                            f5c41bdae7b1ebfd399180692a38e0c2

                            SHA1

                            1746bbd2f2b950f72ba189f4087d430ce7a53df3

                            SHA256

                            13d8e234eb12d1fcbad3919dafd7720d8f336f441081072260293b7b0a8269e6

                            SHA512

                            6b192f327c5080ddbe3e752f36af7d13e6b644e27231054d3a3b011fb21763ed72d989da1da2ce79b09c01480a8b6ce8db686361e6af16b229b24e7457bec20e

                          • C:\Users\Admin\.mysterium-node\keystore\UTC--2024-06-06T05-54-35.050949100Z--162cec1b71fbf7708582d1cff1ef7ea99cf6d57a

                            Filesize

                            489B

                            MD5

                            8289eed061c4747ba303414895a743e9

                            SHA1

                            9f866362d5530742ff16cbc1a084f0ebcb2d03a4

                            SHA256

                            1ab3b1e3c46b7350bf09095524f02a0dc6696081341da724f397555a6526d9d6

                            SHA512

                            29487df3c4d26683bc3dbd43d6474f7609985a9708b1ed4b78101a24ea55ae311de88253212975a22003c59e980fa79fa2a9f10eb470f4888111a9b4dc4fa527

                          • C:\Users\Admin\.mysterium-node\mysterium-node.log

                            Filesize

                            22KB

                            MD5

                            3e48183cb4e096c170ceb84b84a5f158

                            SHA1

                            b655ccf59ed80428dc36f20d227637c0037a22a5

                            SHA256

                            1ec452a62a72caba3bceff2d5ea4cb4f18c52637929e34bd7e5a04efbaff9c16

                            SHA512

                            4e3137908e11dcc74784feae41c9d2f49636587fa0025dddeed2ab0fcfa34e95f4aa9a12664da6be82d7504f15f73d8136bec3dac5854c50387201d9b17340d2

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            439b5e04ca18c7fb02cf406e6eb24167

                            SHA1

                            e0c5bb6216903934726e3570b7d63295b9d28987

                            SHA256

                            247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654

                            SHA512

                            d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            a8e767fd33edd97d306efb6905f93252

                            SHA1

                            a6f80ace2b57599f64b0ae3c7381f34e9456f9d3

                            SHA256

                            c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb

                            SHA512

                            07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            144B

                            MD5

                            1b5987400d1cb2916a9af537667ab755

                            SHA1

                            82ad29c4f4cd495ff03bafcfc1ee2c5286abfa84

                            SHA256

                            fcb9b66310e8d31b77a54d4b24b81e43b2e456bc29c62ef072cb500bd3cd231f

                            SHA512

                            b8016ab5c12b43aebfb24c6801439da379d9a04f1afba90e7a5e91625f552a2140cbbc9773386f7e4b98da67a892af239b086a48730c5e25c8267888ad639f7c

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                            Filesize

                            421B

                            MD5

                            f0cec3a37c0940d9bddef77e4cb6136c

                            SHA1

                            e17bd067ddfecd51fc55eaa9630ca39d9362c317

                            SHA256

                            7206f58e5ee78c92a3c167ca7778ebf7d0fa72c26b0c919ac902956038ec2921

                            SHA512

                            520d6458f50f5122a332d2f437a4c68370cd2513cf99c458f804d9d4c066f409b06d01f5320a83e41a027cee336f64ffaf127aa1150e115848b44f72986a4302

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            e631e3626c40b4b4336b1eb95d09f237

                            SHA1

                            3f16aa3507d8fe3da03a490a143acd46421b326b

                            SHA256

                            3c429564d6d34ae62bd78b69fa8354ec32b52324aac3943aa8d9e8312486935b

                            SHA512

                            a82bc7e1b329ca951ff8cf127a50ccbf73ffb62c47041f8c9cafac331c1624c19ee730d778a42fb5375fd60664e6b639b821c2d0eb282b3175856c33da440857

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            b7e252b5f7526cc3afa360b6f0028b4d

                            SHA1

                            22486c1386a85b0b5eee0480554a0032e737a0b0

                            SHA256

                            8da14b19673f572e6b2096b59d8b5c5957ab55b1310e018b017139dbb350889b

                            SHA512

                            15f0f2a3d13d8dd472e2f107ca4829b01f74c34d26d7f5c8b94746388f6e194e17f254856c519df0ab2fa535e69962372b3d9b258b1c628adf2c0dbb1fcdf8e7

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            bcd519c1f91c9fb626a4bb91e6b2a75b

                            SHA1

                            8f3cdf1b5049559db79137fa82d2235c44a6d28b

                            SHA256

                            12b2c0b0fbc1bc3ecc39fd30a37f77311fe8afdb49a0eb52c5b73ebda71e18f8

                            SHA512

                            b70ef459bb5f9ea76d559eef6f54042cd1007f13b67c529304541994f8dca788124a0d8304402f943685bf833d23f452000179ad65cffba3386023a9762d098f

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                            Filesize

                            537B

                            MD5

                            aa3756c7dc09a967425a5d9f75d29ead

                            SHA1

                            bac02a6ba4aa0469928de75bb1265e9486545113

                            SHA256

                            2f954d593bc82508b667ee04c886cb4fcb10971fee37eb914342cb5343cc0a62

                            SHA512

                            a6f29b700bf7130c59a1b4fb021fa23f9e3e4abb516d8f15221761a5d73e25676af049f2d7ab33838eb85c6d086b083bfdc532e057d928de50ffb8c6057729fb

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5874dd.TMP

                            Filesize

                            537B

                            MD5

                            a234cc4dfa82784770e73abf22a46153

                            SHA1

                            d3b26dafa49d5c8e8ed60e72e746be4818ab1c55

                            SHA256

                            00a69575ee8db6800136edf3a5d67a4a0eaf4f1b7322aa9b3eb444f61cf03680

                            SHA512

                            ef34d1ce035680e8ba7f16b6c1a44387d398000901f475ea22f56fba8785deea40dd36bee4c2426bc9d605e42efb0527d49feed3f48533b955237c5a4df5f250

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            46295cac801e5d4857d09837238a6394

                            SHA1

                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                            SHA256

                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                            SHA512

                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            206702161f94c5cd39fadd03f4014d98

                            SHA1

                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                            SHA256

                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                            SHA512

                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            11KB

                            MD5

                            b41d006fc92331ddfcf3f0a2688912ca

                            SHA1

                            ba8d56db06dd6029629ed796e643b7e273b1de2e

                            SHA256

                            1abf5151938da6b694e7e8d2a7f418cee9e393625dccab69cb0fd35bcce54b44

                            SHA512

                            0143f09dd50db01f39b562af4de5c20052816a70785de983fa1da5668b760919d0594f05b9855437d9fb2ce75a469aec5c57be6bcd3728d75e86621aed8a2dd7

                          • memory/4268-122-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-158-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-224-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-243-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-174-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-264-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-202-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-297-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-310-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-320-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-331-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB

                          • memory/4268-341-0x0000000000E00000-0x0000000003EC8000-memory.dmp

                            Filesize

                            48.8MB