Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/06/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
nexusLatest.rbxm
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
nexusLatest.rbxm
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
nexusLatest.rbxm
Resource
win11-20240508-en
General
-
Target
nexusLatest.rbxm
-
Size
88KB
-
MD5
4393ed07caf83c6f62262a1fe11f0e79
-
SHA1
1445d4ed1d91bdf33340ea10855639081a68bac4
-
SHA256
e8227a9f4a6d9f7bfd6d911ca3b7c65fc2e21f4d7c2e09fdb59f35d45ec9c539
-
SHA512
cb0e3d7194d8ac9f9f85488f3f6b8c8ffadaa3d0d524ff8c10c040299c05fd048a8c87cf065a17e92881ae0b541e06a994142e7f67015c7c96a58f8140441990
-
SSDEEP
1536:FAksIWfJ3jlUfNwbvd0MXI84mcFq3oNjz6JlArujLShy8k4:R+djIwmTNFqYdz6Xp/Shb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 2460 msedge.exe 2460 msedge.exe 1224 msedge.exe 1224 msedge.exe 1376 identity_helper.exe 1376 identity_helper.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2924 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 652 2460 msedge.exe 83 PID 2460 wrote to memory of 652 2460 msedge.exe 83 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 3116 2460 msedge.exe 84 PID 2460 wrote to memory of 4332 2460 msedge.exe 85 PID 2460 wrote to memory of 4332 2460 msedge.exe 85 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86 PID 2460 wrote to memory of 3548 2460 msedge.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\nexusLatest.rbxm1⤵
- Modifies registry class
PID:4528
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\NewAdd.svg1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x50,0x104,0x108,0x100,0x10c,0x7ffc62dd3cb8,0x7ffc62dd3cc8,0x7ffc62dd3cd82⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4356 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14611228330414070611,3873354284598635166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:2104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50d84d1490aa9f725b68407eab8f0030e
SHA183964574467b7422e160af34ef024d1821d6d1c3
SHA25640c09bb0248add089873d1117aadefb46c1b4e23241ba4621f707312de9c829e
SHA512f84552335ff96b5b4841ec26e222c24af79b6d0271d27ad05a9dfcee254a7b9e9019e7fac0def1245a74754fae81f7126499bf1001615073284052aaa949fa00
-
Filesize
152B
MD50c705388d79c00418e5c1751159353e3
SHA1aaeafebce5483626ef82813d286511c1f353f861
SHA256697bd270be634688c48210bee7c5111d7897fd71a6af0bbb2141cefd2f8e4a4d
SHA512c1614e79650ab9822c4e175ba528ea4efadc7a6313204e4e69b4a9bd06327fb92f56fba95f2595885b1604ca8d8f6b282ab542988995c674d89901da2bc4186f
-
Filesize
5KB
MD55ad1b448d1a0143cd265ee929c4d7bfc
SHA12445c3e38a9ae18c765798317c4a1dd2d4697e64
SHA256e04bb0d406fe2bd41c91f149fa0e8cb7b150fc26978e69c590430ae3fd979a3e
SHA51293cede3422aedf33af57ecbc6644f03dbbfc371bde243bf60ff943845d6639e59137df6e90a492d8ac848c2c5ed5d6024fffbe8e1ade24ab4d249247fa03cdfc
-
Filesize
5KB
MD580f5467b52e97b857fbf822d072492eb
SHA18f8386de62aab514d246e863cdfbf5a13ea12c32
SHA256ae01d9e82ffb15fbca4c82b18c67619a1a8813c14af3e707184e9cf6b6fc58bd
SHA512da48cfb354edbbfdca1e3538c8d8eb856c31ff648d554da7d849c7b6b56a9da4e9963d7a10ab2035f96205efb06fcd885e78ebf425e99135addc8e78d6f792f2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5b2917adad3cdb9c60db8abc77773008d
SHA1625e34d42e4ef7e4123c84babafbd7aa8d7fa5f0
SHA25679d515f5c84a03258bf029d799569374716e6b1b1988302dfe51b05c15aeac52
SHA5122dd7289e52bb16d65d54b09eec6a0da8a61061694135a5f9aead433f630aea87eb821428a2235d26f50569ac3399c759b8c2d544496ea8a6f45599b7b2a3603d