Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    599s
  • max time network
    405s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/08/2024, 17:59

General

  • Target

    2pacalypse.exe

  • Size

    144KB

  • MD5

    50953ad96a9adf609adb1f1123df4258

  • SHA1

    db8897a56f9a83c0e4c4f0121bc519edd6b52a8b

  • SHA256

    88058f293fae03971d96cb3433b7a6a9adbbd8034775fe8b57226505ad03138c

  • SHA512

    8cbd1e48105d74ba33c8f3ef2acd035fed8254c3dae1cfcbb79bd209ae3a702add49f86751f8be9fcc0999278a014c47e367f49a6fb3b11bee3b1109bfe81163

  • SSDEEP

    3072:U8vbzyQ6Y1YXrbNK+3FNxacPEMk6bRQAgTWA:UszAXNK+3FVfRQzTW

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2pacalypse.exe
    "C:\Users\Admin\AppData\Local\Temp\2pacalypse.exe"
    1⤵
    • Checks computer location settings
    PID:2280
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4588
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:700
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1252
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4944
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E49JWOHD\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\H55MLHTJ\dotnet.microsoft[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\H55MLHTJ\dotnet.microsoft[1].xml

    Filesize

    84B

    MD5

    0d1130d74bbc9114c8e0bfdaab3b9a22

    SHA1

    f4aacea81c788e290f311bed1e56549f5114d247

    SHA256

    75bf2fa3a9676f0d81927b779776d45a13988e8d8c08664af9dd19b528fa8e50

    SHA512

    01ff9f095e1004d94a1cc4356da2a46518c274e521f75ff64d243ec1910cdaef497aeb353e5c077e4ec09e90dc4133fee60b93a6903c99789b358cc9f702fe9f

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\KSLURE17\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\02NAP4JI\windowsdesktop-runtime-6.0.32-win-x64[1].exe

    Filesize

    32KB

    MD5

    47755c618a9a9e4c5bda3a442f99485f

    SHA1

    382cbb19d802d77b52cf8c1cf85ba32eddcbd07e

    SHA256

    7f743326cbab2e1312dff1614a09ebdb17d1a4963ad5fbd73eaee2b90b966aba

    SHA512

    9c93583b11f2e8b4fcad6055d6ca05ac853d5314cd15295284ad260b81073af9dbcdcf558420e2a367561e6e98b361842e7a322fb9f04d0238d2b4a9c780f6b5

  • memory/2068-153-0x00000235E5DB0000-0x00000235E5DB2000-memory.dmp

    Filesize

    8KB

  • memory/2068-227-0x00000235E9F00000-0x00000235EA000000-memory.dmp

    Filesize

    1024KB

  • memory/2068-341-0x00000235D2850000-0x00000235D2852000-memory.dmp

    Filesize

    8KB

  • memory/2068-165-0x00000235E8A20000-0x00000235E8A22000-memory.dmp

    Filesize

    8KB

  • memory/2068-163-0x00000235E8A00000-0x00000235E8A02000-memory.dmp

    Filesize

    8KB

  • memory/2068-161-0x00000235E88E0000-0x00000235E88E2000-memory.dmp

    Filesize

    8KB

  • memory/2068-157-0x00000235E5DF0000-0x00000235E5DF2000-memory.dmp

    Filesize

    8KB

  • memory/2068-155-0x00000235E5DD0000-0x00000235E5DD2000-memory.dmp

    Filesize

    8KB

  • memory/2068-167-0x00000235E8A40000-0x00000235E8A42000-memory.dmp

    Filesize

    8KB

  • memory/2068-171-0x00000235E8B70000-0x00000235E8B72000-memory.dmp

    Filesize

    8KB

  • memory/2068-194-0x00000235E3830000-0x00000235E3930000-memory.dmp

    Filesize

    1024KB

  • memory/2068-159-0x00000235E8820000-0x00000235E8822000-memory.dmp

    Filesize

    8KB

  • memory/2068-63-0x00000235D2C00000-0x00000235D2D00000-memory.dmp

    Filesize

    1024KB

  • memory/2068-259-0x00000235E9640000-0x00000235E9660000-memory.dmp

    Filesize

    128KB

  • memory/2068-258-0x00000235E96A0000-0x00000235E96C0000-memory.dmp

    Filesize

    128KB

  • memory/2068-281-0x00000235E9680000-0x00000235E96A0000-memory.dmp

    Filesize

    128KB

  • memory/2068-309-0x00000235E9B60000-0x00000235E9B80000-memory.dmp

    Filesize

    128KB

  • memory/4588-1-0x000001D0AA230000-0x000001D0AA240000-memory.dmp

    Filesize

    64KB

  • memory/4588-35-0x000001D0A9410000-0x000001D0A9412000-memory.dmp

    Filesize

    8KB

  • memory/4588-371-0x000001D0B2760000-0x000001D0B2761000-memory.dmp

    Filesize

    4KB

  • memory/4588-372-0x000001D0B2770000-0x000001D0B2771000-memory.dmp

    Filesize

    4KB

  • memory/4588-17-0x000001D0AA330000-0x000001D0AA340000-memory.dmp

    Filesize

    64KB

  • memory/4944-45-0x00000133BEC00000-0x00000133BED00000-memory.dmp

    Filesize

    1024KB