Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-fr
  • resource tags

    arch:x64arch:x86image:win10-20240611-frlocale:fr-fros:windows10-1703-x64systemwindows
  • submitted
    04/07/2024, 15:19

General

  • Target

    https://partages.genapicloud.com/Share?id=MGI1ZTZhNjQtNDI0OC00NjEwLWI0OTctMDk0ZjE0ZGQ5MWY3YTU4NTdiNjEtNWY0Yy00ZTY2LWJhNWQtNGZmNjIyMGJjNzFi

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://partages.genapicloud.com/Share?id=MGI1ZTZhNjQtNDI0OC00NjEwLWI0OTctMDk0ZjE0ZGQ5MWY3YTU4NTdiNjEtNWY0Yy00ZTY2LWJhNWQtNGZmNjIyMGJjNzFi"
    1⤵
      PID:3348
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3856
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3056
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2340
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2100
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:5020
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:1124
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2256
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:1000

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BU0KRETY\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\DVZB8KCY\suggestions[1].fr-FR

      Filesize

      18KB

      MD5

      8a7cad320c60fea62979c8efb384a079

      SHA1

      39954694c9d985cfef2a6021b479071fce173e4d

      SHA256

      1d49c21dcc462f6188e77a35b1edba730db08058e76bd0204470eb63a7e0074a

      SHA512

      4bdb3ffd7341e403597e3f9f50e2ca91f536a580ac169760f997054c60041c35c3ed2b4197f52fbbacc8c11315cee693ada1ec50b30ee9d2332cc4f22ea7a494

    • memory/2100-42-0x0000013A43640000-0x0000013A43740000-memory.dmp

      Filesize

      1024KB

    • memory/3856-16-0x0000018890320000-0x0000018890330000-memory.dmp

      Filesize

      64KB

    • memory/3856-0-0x0000018890220000-0x0000018890230000-memory.dmp

      Filesize

      64KB

    • memory/3856-35-0x000001888D670000-0x000001888D672000-memory.dmp

      Filesize

      8KB

    • memory/3856-129-0x0000018898410000-0x0000018898411000-memory.dmp

      Filesize

      4KB

    • memory/3856-128-0x0000018898400000-0x0000018898401000-memory.dmp

      Filesize

      4KB

    • memory/5020-92-0x0000021F56150000-0x0000021F56152000-memory.dmp

      Filesize

      8KB

    • memory/5020-90-0x0000021F56130000-0x0000021F56132000-memory.dmp

      Filesize

      8KB

    • memory/5020-88-0x0000021F56110000-0x0000021F56112000-memory.dmp

      Filesize

      8KB

    • memory/5020-86-0x0000021F56060000-0x0000021F56062000-memory.dmp

      Filesize

      8KB

    • memory/5020-84-0x0000021F56040000-0x0000021F56042000-memory.dmp

      Filesize

      8KB

    • memory/5020-94-0x0000021F56170000-0x0000021F56172000-memory.dmp

      Filesize

      8KB

    • memory/5020-96-0x0000021F56190000-0x0000021F56192000-memory.dmp

      Filesize

      8KB

    • memory/5020-98-0x0000021F561B0000-0x0000021F561B2000-memory.dmp

      Filesize

      8KB

    • memory/5020-100-0x0000021F561D0000-0x0000021F561D2000-memory.dmp

      Filesize

      8KB

    • memory/5020-80-0x0000021F56010000-0x0000021F56012000-memory.dmp

      Filesize

      8KB

    • memory/5020-82-0x0000021F56020000-0x0000021F56022000-memory.dmp

      Filesize

      8KB

    • memory/5020-78-0x0000021F55EF0000-0x0000021F55EF2000-memory.dmp

      Filesize

      8KB

    • memory/5020-62-0x0000021F45400000-0x0000021F45500000-memory.dmp

      Filesize

      1024KB