Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    17s
  • max time network
    18s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 15:14 UTC

General

  • Target

    https://glovedinosaurs.website/pc.php?code=vad&q=Kiwi%20X%20Executor&source=qiwi&s1=&s2=&s3=&s4=&s5=&click_id=&dt=1722611551&p=

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://glovedinosaurs.website/pc.php?code=vad&q=Kiwi%20X%20Executor&source=qiwi&s1=&s2=&s3=&s4=&s5=&click_id=&dt=1722611551&p=
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82b1346f8,0x7ff82b134708,0x7ff82b134718
      2⤵
        PID:4296
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3956010669089263593,4243291311725981223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
        2⤵
          PID:2336
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3956010669089263593,4243291311725981223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5080
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3956010669089263593,4243291311725981223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:8
          2⤵
            PID:2920
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3956010669089263593,4243291311725981223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
            2⤵
              PID:2856
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3956010669089263593,4243291311725981223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
              2⤵
                PID:3216
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3956010669089263593,4243291311725981223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:8
                2⤵
                  PID:3100
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3956010669089263593,4243291311725981223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3644
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3956010669089263593,4243291311725981223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:1
                  2⤵
                    PID:3352
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3956010669089263593,4243291311725981223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:1
                    2⤵
                      PID:3604
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3956010669089263593,4243291311725981223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:1
                      2⤵
                        PID:3552
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:4884
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:3980

                        Network

                        • flag-us
                          DNS
                          glovedinosaurs.website
                          msedge.exe
                          Remote address:
                          8.8.8.8:53
                          Request
                          glovedinosaurs.website
                          IN A
                          Response
                          glovedinosaurs.website
                          IN A
                          194.54.164.123
                        • flag-us
                          DNS
                          134.32.126.40.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          134.32.126.40.in-addr.arpa
                          IN PTR
                          Response
                        • 194.54.164.123:443
                          glovedinosaurs.website
                          msedge.exe
                          260 B
                          160 B
                          5
                          4
                        • 194.54.164.123:443
                          glovedinosaurs.website
                          msedge.exe
                          260 B
                          160 B
                          5
                          4
                        • 194.54.164.123:443
                          glovedinosaurs.website
                          msedge.exe
                          260 B
                          160 B
                          5
                          4
                        • 194.54.164.123:443
                          glovedinosaurs.website
                          msedge.exe
                          260 B
                          160 B
                          5
                          4
                        • 194.54.164.123:443
                          glovedinosaurs.website
                          msedge.exe
                          260 B
                          200 B
                          5
                          5
                        • 194.54.164.123:443
                          glovedinosaurs.website
                          msedge.exe
                          260 B
                          160 B
                          5
                          4
                        • 194.54.164.123:443
                          glovedinosaurs.website
                          msedge.exe
                          208 B
                          120 B
                          4
                          3
                        • 194.54.164.123:443
                          glovedinosaurs.website
                          msedge.exe
                          208 B
                          160 B
                          4
                          4
                        • 8.8.8.8:53
                          glovedinosaurs.website
                          dns
                          msedge.exe
                          68 B
                          84 B
                          1
                          1

                          DNS Request

                          glovedinosaurs.website

                          DNS Response

                          194.54.164.123

                        • 8.8.8.8:53
                          134.32.126.40.in-addr.arpa
                          dns
                          72 B
                          158 B
                          1
                          1

                          DNS Request

                          134.32.126.40.in-addr.arpa

                        • 224.0.0.251:5353
                          588 B
                          9

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          53bc70ecb115bdbabe67620c416fe9b3

                          SHA1

                          af66ec51a13a59639eaf54d62ff3b4f092bb2fc1

                          SHA256

                          b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771

                          SHA512

                          cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          e765f3d75e6b0e4a7119c8b14d47d8da

                          SHA1

                          cc9f7c7826c2e1a129e7d98884926076c3714fc0

                          SHA256

                          986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89

                          SHA512

                          a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\09f54824-f16b-43b3-a04b-5356b6fade3e.tmp

                          Filesize

                          6KB

                          MD5

                          ee4f7176e928d524b039562bda4bcddf

                          SHA1

                          5124c061ff9b12a4840d1659c41b6e6e549bb6d2

                          SHA256

                          3eedf2a47e6d443d29fcc6f844fcad0cc53d89ef63e88336aa82257f36f31cf2

                          SHA512

                          7064276c3ada2ea790dbbc7af877217c9f382a9d66b6109726171547dd73a4edac529e52eabc221a3bb432c84ab2456e225e0c1f72b09d4c5a14929b094b558b

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          263f0839edc5f0dabc3b61c7c244082a

                          SHA1

                          d1a808d0377db697f69f0f75f6f2c4a9a0d532ab

                          SHA256

                          4f1c0cbdee159ed1a7bad893ee6c365babb325d7fe495cf98fe419871782ec66

                          SHA512

                          7a5d5cee65c23fc8e52c9e8a9b63e0e42d789660ed19f3696f3e9944bfb6451962d40082e79ebf27f84f6487e6e9c4d112241585d9e89de5149f927b04d9c890

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          6752a1d65b201c13b62ea44016eb221f

                          SHA1

                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                          SHA256

                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                          SHA512

                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          10KB

                          MD5

                          4fd0cd2a6eaa8afcccc65e64262e309c

                          SHA1

                          19e0e683dcc722909bf728fdb2c14606ff282211

                          SHA256

                          a00bf30f9f42d06fc03c5fe677905f8c2400e9b7309a00a3ed7326678ac7f204

                          SHA512

                          345c6a791cc08cc94a09b3c31adb3d9f5e42e76fb87937da8785a5af8d0d6c3f20fa05a5a626a2d270c747a1eccdb581957329161017ce951ae7cdcf45358490

                        We care about your privacy.

                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.