Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

06/08/2024, 11:59

240806-n57e6asdpg 3

06/08/2024, 11:58

240806-n5l48ayckr 3

Analysis

  • max time kernel
    145s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 11:59

General

  • Target

    https://url7304.disco-mailer.net/ls/click?upn=u001.DWLeRfOXStcSaUNphm6ZnPlr7dXPZppGe9JCAjtR0dPxlCHjdsPPz6NSSVctLDySfBuPAmryE0p27O3SkvdbWLpPQOn6YOyqB6opBfAlhQDTURvmA7mtzot4xfIC0E2rFzW9HV7-2BnJ2qVoZgOclZa39HZ0LtuPgrXriXcIP9H12DQmYjbAe5nUpSlVcy5FVWlD0tnX2wEKOVebi-2BSG4PnA-3D-3DkfCm_5KlZmZKASPtIpYbHU6HHQmxS-2FHe3g010GX01BBBmlalJnMdBClXoEYQADKPWInqg17tt-2FrBm3UZgnyanDR8jwatbZRHVfV-2BqpXIR6q7UnMLsBwjFhgT2yBtB4rpmQEbwLhdggiGBfG0LHxHg-2BVEFN-2FYsR8gjYhrdp5PuboonIyxJCuKNvU7-2B4917j4-2F8K7-2FeBxnNTksIx-2F9BCtsstldZMa0PpraVhS0lDSyBp60uku-2FvZfM6N8EgKYdGmdTUqJ-2B-2FkexX3fT9aDtUx22Lba-2FFtSF4-2BYjOUMv9iZM3Xyxm9XmjDv3k2M8Hdx99-2Frb35JbiFReYEyWeOTpGHNmW30m5uG9Bm4ZPFf135XIfEnmB2BMOZe5mWnkWPp-2B-2Bii3xSyxi

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://url7304.disco-mailer.net/ls/click?upn=u001.DWLeRfOXStcSaUNphm6ZnPlr7dXPZppGe9JCAjtR0dPxlCHjdsPPz6NSSVctLDySfBuPAmryE0p27O3SkvdbWLpPQOn6YOyqB6opBfAlhQDTURvmA7mtzot4xfIC0E2rFzW9HV7-2BnJ2qVoZgOclZa39HZ0LtuPgrXriXcIP9H12DQmYjbAe5nUpSlVcy5FVWlD0tnX2wEKOVebi-2BSG4PnA-3D-3DkfCm_5KlZmZKASPtIpYbHU6HHQmxS-2FHe3g010GX01BBBmlalJnMdBClXoEYQADKPWInqg17tt-2FrBm3UZgnyanDR8jwatbZRHVfV-2BqpXIR6q7UnMLsBwjFhgT2yBtB4rpmQEbwLhdggiGBfG0LHxHg-2BVEFN-2FYsR8gjYhrdp5PuboonIyxJCuKNvU7-2B4917j4-2F8K7-2FeBxnNTksIx-2F9BCtsstldZMa0PpraVhS0lDSyBp60uku-2FvZfM6N8EgKYdGmdTUqJ-2B-2FkexX3fT9aDtUx22Lba-2FFtSF4-2BYjOUMv9iZM3Xyxm9XmjDv3k2M8Hdx99-2Frb35JbiFReYEyWeOTpGHNmW30m5uG9Bm4ZPFf135XIfEnmB2BMOZe5mWnkWPp-2B-2Bii3xSyxi
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba3b746f8,0x7ffba3b74708,0x7ffba3b74718
      2⤵
        PID:8
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
        2⤵
          PID:3976
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4148
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
          2⤵
            PID:5092
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
            2⤵
              PID:4976
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
              2⤵
                PID:2228
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1
                2⤵
                  PID:4992
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:8
                  2⤵
                    PID:5104
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3472
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:1
                    2⤵
                      PID:2376
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:1
                      2⤵
                        PID:1032
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1
                        2⤵
                          PID:4564
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
                          2⤵
                            PID:3664
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,83147440059914492,16164680065562799139,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4896
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1600
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1528

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              53bc70ecb115bdbabe67620c416fe9b3

                              SHA1

                              af66ec51a13a59639eaf54d62ff3b4f092bb2fc1

                              SHA256

                              b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771

                              SHA512

                              cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              e765f3d75e6b0e4a7119c8b14d47d8da

                              SHA1

                              cc9f7c7826c2e1a129e7d98884926076c3714fc0

                              SHA256

                              986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89

                              SHA512

                              a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              344B

                              MD5

                              8a4cdbd55c168313f72cc2b3c2846d0b

                              SHA1

                              8dece23da10e73fb2ea2cb25290a627e749927fb

                              SHA256

                              b2b8474bf19bcf35b0c882b7e475b963c53b8f60cdb2c9ff6c8c290babd31f19

                              SHA512

                              64f4d0a0266c295070075214efe962b6f4cf2cba5cad03cb662fae6e1c03e3025807ac127d4c60fef16baba74e4bf5eb1b300f303498eb55c2ffc2c8c657c374

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              c46000dfb59a90c3c09558f2b54cd7cc

                              SHA1

                              43293a8f68854240785a6ea5393628405210664d

                              SHA256

                              a02b345d59b5f47d246628769e42d03c24b4313236fe4e47e5c26b87fa521c84

                              SHA512

                              1ebde8648d5c807ef5e068a595183c9e2aaca0f62350be54d86e46cde2312b7422b91090ca90bacca3657bb0417c773178f3efa31e3811362918fd239d7ea5db

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              16f17c55747426f35aed850e2b3f1943

                              SHA1

                              64a3e92cf29e3a7212a8b0f6d82d8719bf4ddef4

                              SHA256

                              f39f78f1a714cfa87c6126a00a903a131181cf068fb6eca613cc6cdd7fdcff2f

                              SHA512

                              147780d62dd8ebb9c4497b8cf173044a89bbf3261e13dbafcfe4b0c9b6980e245c9a748dedea1d85dc5c23e389d98d2887c13bd7c06e4f46a580473476624c98

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              b34e1708214413a2f669e88b31ce4195

                              SHA1

                              af0561794ff4085fd1bccde4bf51c64ece18fbf1

                              SHA256

                              ff81e30049b4fafea7eb3acb75da63656a45dadf4a7607bb3c708cbeed1a248f

                              SHA512

                              b3f31cbfb38d3efbb7d582b6357d5076e4ddc17ad4233219b4e1544dede5a53a191c04ee2b09662d19d79729515ef1dcfaca0ba07a6f089d3ae41e00c7105f6d