Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 20:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1c0FT0lY0Ob0V0IzROqiD3IeLEkoLvXa0/view
Resource
win10v2004-20240709-en
General
-
Target
https://drive.google.com/file/d/1c0FT0lY0Ob0V0IzROqiD3IeLEkoLvXa0/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 21 drive.google.com 28 drive.google.com 8 drive.google.com 14 drive.google.com 15 drive.google.com -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Local Settings firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4704 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4544 wrote to memory of 4704 4544 firefox.exe 85 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 1932 4704 firefox.exe 86 PID 4704 wrote to memory of 112 4704 firefox.exe 87 PID 4704 wrote to memory of 112 4704 firefox.exe 87 PID 4704 wrote to memory of 112 4704 firefox.exe 87 PID 4704 wrote to memory of 112 4704 firefox.exe 87 PID 4704 wrote to memory of 112 4704 firefox.exe 87 PID 4704 wrote to memory of 112 4704 firefox.exe 87 PID 4704 wrote to memory of 112 4704 firefox.exe 87 PID 4704 wrote to memory of 112 4704 firefox.exe 87
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://drive.google.com/file/d/1c0FT0lY0Ob0V0IzROqiD3IeLEkoLvXa0/view"1⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://drive.google.com/file/d/1c0FT0lY0Ob0V0IzROqiD3IeLEkoLvXa0/view2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 25755 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e61fae2d-5550-4e1a-ba89-c4536af01e78} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" gpu3⤵PID:1932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2408 -prefMapHandle 2404 -prefsLen 26675 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {676c7e06-aca5-4b2b-b807-4ef52280026f} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" socket3⤵PID:112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2980 -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 3152 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {190ac9b0-3857-4db3-b6a4-0649788c373e} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab3⤵PID:2312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3884 -childID 2 -isForBrowser -prefsHandle 3880 -prefMapHandle 3876 -prefsLen 31165 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9d92ab0-1f47-411c-8291-32f535b9e776} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab3⤵PID:4664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4860 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4868 -prefMapHandle 4864 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {15c739bf-b9b0-4d04-a4d6-5e7e13c76f47} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" utility3⤵PID:3456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5008 -childID 3 -isForBrowser -prefsHandle 4992 -prefMapHandle 4884 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b9ac387-297c-43aa-93fc-3de3ed54777f} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab3⤵PID:3924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 4 -isForBrowser -prefsHandle 5144 -prefMapHandle 5140 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8930ebea-a35c-479c-819c-19d8b4c2114b} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab3⤵PID:4108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 5 -isForBrowser -prefsHandle 5616 -prefMapHandle 5612 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6fc4ade8-7be0-4807-baa9-7b857cbbdc22} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab3⤵PID:1508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 6 -isForBrowser -prefsHandle 5964 -prefMapHandle 5312 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1811e3b1-824a-48eb-ac44-fc806fe9dfec} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab3⤵PID:2144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\AlternateServices.bin
Filesize8KB
MD58a3c33161c0a059b8465623e0ce2cb27
SHA114d4374cb589c1a56d8a62771d6e2833b56249a1
SHA25602a311b2cd3736c1b7393a0e5335c049ecb22fb35e8ddc92522f1354de953671
SHA5121d3aab099c4930949dc81a88b2b3b0840716d09d3885f868d1c7da891c417223788604eb3ab3ba4204dffe5266cb9c6a6ad188030950c6e20fbe66054ecb8efc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53013017ff5b978132ffc385a4a64c82a
SHA1bf019e74b5c64405586d9b3bd76098b6f2b95fc7
SHA2564de04871251a2312b8307266868f16bdb5762f499d8fe75b2050ef7d9e2bde35
SHA512e9ffd6fc91d71e852e0ba1cfa82b9f80b50dd2ae9c97af63250f18888ce8227163a3139d8b861a155468dc2106416c9f57ebc7eba103fcf5a4c06792bd841876
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ad671424f945042e85ad1c8d5b130525
SHA1bd5ccdfdb2693bcdd74ba9b1a0a29df95fd1d659
SHA25632dba54e21bb2493d3cd2c692f2526d7077437e9ea462f3dbc8495a1ccd40b7a
SHA512632d043cae0ad9fbe4f3a138b3f21582f84520c918b5c640aa4c114f9065955f29c69b57c42721458847c7ced1c99859e45bc0108278a14c5ab2395185db87aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\pending_pings\1a6f4e03-6125-4a59-a6c8-581b66f7b624
Filesize671B
MD57b8bba23992fc1f5a1976e967e385e42
SHA1c275bd687ef94561f13e6e380b65a107f4f49f86
SHA256de6d91fda2843ade1d8affd3ad2fafe3a56beca42f4ca19077fea8121d464407
SHA512956e17c421fd841da8854ca7061470cc3817a4a8c0dfd98357bc9e40c20bd6f62757322d9b1a3e3d00be7449cb837216ff760f559d19de7482d97270900d452d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\pending_pings\8cc49163-6eb6-48d8-b7c6-a16be5f9bdbf
Filesize25KB
MD5ffe43b7e070efb2d312c1d1f18b3956a
SHA1daf38be22ec9757bda3d967185e8a758e3287e04
SHA256c2521e16a633ed4b99629fa7088569e89927d2ea28a690c6abea6a3fe25a5892
SHA51237d21498a1448f5cce650fe5b8534e2ec545eb67b9c0e79f6deb0d8cc8634209c8e7c1ca467fa37b197421baa4bba20fb8b20fd57f00a9224c5ddb0973a3632e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\pending_pings\991b603c-8bd2-4746-801c-50b7557f4e2a
Filesize982B
MD505573275f5c95259af7660c56f8fce6c
SHA1948588465429138a1540ec757554c0a19af355fb
SHA256c99362ca58b2f8b8c04e37e2d4e0f1c75f09f72c34abde4b9d35fe5d895d56d2
SHA512992a443c02537505fe8630a21355b739995944771cd6c2a15651cee996d11c663ab2d08068a72a993a641db27f6984e7ad09727811621daeacdb97a93cebab1d
-
Filesize
10KB
MD59877d51804bc1b472d57919cbef63a96
SHA1f595784a3cd1de0fedf566aeff22ed17b4ec6897
SHA256a66bdf6a4acf2c0cd7447f809d6c20b3337bb0dc53108fdf9609a8b3ccb11c35
SHA51298311f4acfbb648668ee49807af52ad4c3cac81cd995875447019b9040d1ae44c7e53d76c2aee6fd6c9a15ca020fdb60b5f00df6962b31824c51d811cf50a2aa
-
Filesize
8KB
MD51028c0df36cb6d0c69ddccbe86a774a0
SHA1c18ae361b9a58d0caf86b2a6fd0877f500a256d7
SHA256df11c6e6fee95617652f5d895e55806458dba906a0a502c35f2a4042f417a8cd
SHA512a6fcd92f9bfa6df87b3776c0641c175f9ad323a75d1a263bb75992966b005cfae35aff9a42ee0f5edcfb1b46395452815f65db6e8677f4ae8e31384127c7bcf4