Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/08/2024, 12:47

General

  • Target

    Magpie.exe

  • Size

    2.9MB

  • MD5

    7780874502e03990a976d1bc2ae20796

  • SHA1

    072e67bcb68447334ef5babb1dabf68631da9ba3

  • SHA256

    29a430de7e6fdfdb4dc9b67e8b319a36a6a8d4de3901cd13ffd7b6cb4ec78778

  • SHA512

    ef2ad89f88ce6f019a1006f1fe5e580f69a53cec9a1180e4eb3b80d112be90969f193c361a2d27c303a1289666825212740cfa68c2061ee96d41a9d7f0b67c44

  • SSDEEP

    49152:osVQB93AUKo7KfuOD5g3xdRDO+CjXVKIF91RFdtx999FtprsA8MusVX8EH9I/GMR:TVimWgpGsVXRH9dMCeW+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Magpie.exe
    "C:\Users\Admin\AppData\Local\Temp\Magpie.exe"
    1⤵
    • Checks computer location settings
    PID:4540
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4668
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:2560
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3476
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:5012
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4236
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E49JWOHD\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\E73DYB5I\dotnet.microsoft[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\E73DYB5I\dotnet.microsoft[1].xml

    Filesize

    17B

    MD5

    3ff4d575d1d04c3b54f67a6310f2fc95

    SHA1

    1308937c1a46e6c331d5456bcd4b2182dc444040

    SHA256

    021a5868b6c9e8beba07848ba30586c693f87ac02ee2ccaa0f26b7163c0c6b44

    SHA512

    2b26501c4bf86ed66e941735c49ac445d683ad49ed94c5d87cc96228081ae2c8f4a8f44a2a5276b9f4b0962decfce6b9eeee38e42262ce8d865d5df0df7ec3d6

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\JJCQ2RBJ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\KOPH2PH9\windowsdesktop-runtime-6.0.32-win-x64[1].exe

    Filesize

    32KB

    MD5

    47755c618a9a9e4c5bda3a442f99485f

    SHA1

    382cbb19d802d77b52cf8c1cf85ba32eddcbd07e

    SHA256

    7f743326cbab2e1312dff1614a09ebdb17d1a4963ad5fbd73eaee2b90b966aba

    SHA512

    9c93583b11f2e8b4fcad6055d6ca05ac853d5314cd15295284ad260b81073af9dbcdcf558420e2a367561e6e98b361842e7a322fb9f04d0238d2b4a9c780f6b5

  • memory/4236-199-0x0000028223D20000-0x0000028223D22000-memory.dmp

    Filesize

    8KB

  • memory/4236-286-0x00000282123B0000-0x00000282123B2000-memory.dmp

    Filesize

    8KB

  • memory/4236-63-0x0000028212780000-0x0000028212782000-memory.dmp

    Filesize

    8KB

  • memory/4236-58-0x0000028212730000-0x0000028212732000-memory.dmp

    Filesize

    8KB

  • memory/4236-193-0x0000028223CB0000-0x0000028223CB2000-memory.dmp

    Filesize

    8KB

  • memory/4236-61-0x0000028212760000-0x0000028212762000-memory.dmp

    Filesize

    8KB

  • memory/4236-197-0x0000028223D00000-0x0000028223D02000-memory.dmp

    Filesize

    8KB

  • memory/4236-195-0x0000028223CD0000-0x0000028223CD2000-memory.dmp

    Filesize

    8KB

  • memory/4236-191-0x0000028223C70000-0x0000028223C72000-memory.dmp

    Filesize

    8KB

  • memory/4236-189-0x0000028223C50000-0x0000028223C52000-memory.dmp

    Filesize

    8KB

  • memory/4236-237-0x0000028225790000-0x0000028225890000-memory.dmp

    Filesize

    1024KB

  • memory/4236-279-0x0000028229D40000-0x0000028229E40000-memory.dmp

    Filesize

    1024KB

  • memory/4668-16-0x0000016382C20000-0x0000016382C30000-memory.dmp

    Filesize

    64KB

  • memory/4668-35-0x0000016386DD0000-0x0000016386DD2000-memory.dmp

    Filesize

    8KB

  • memory/4668-311-0x00000163898E0000-0x00000163898E1000-memory.dmp

    Filesize

    4KB

  • memory/4668-312-0x00000163898F0000-0x00000163898F1000-memory.dmp

    Filesize

    4KB

  • memory/4668-0-0x0000016382B20000-0x0000016382B30000-memory.dmp

    Filesize

    64KB

  • memory/5012-42-0x000001D57BC00000-0x000001D57BD00000-memory.dmp

    Filesize

    1024KB