Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

29/08/2024, 07:46

240829-jmgdsssenl 5

29/08/2024, 07:43

240829-jkga1ssdrn 3

29/08/2024, 07:37

240829-jfshgsscpk 3

Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 07:37

General

  • Target

    http://zn4.gnezdo.ru.

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://zn4.gnezdo.ru.
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab4c846f8,0x7ffab4c84708,0x7ffab4c84718
      2⤵
        PID:2880
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:2
        2⤵
          PID:1928
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1396
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:8
          2⤵
            PID:4168
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:1
            2⤵
              PID:1432
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1
              2⤵
                PID:1380
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:8
                2⤵
                  PID:1412
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3112
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:1
                  2⤵
                    PID:4016
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                    2⤵
                      PID:2384
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:1
                      2⤵
                        PID:4668
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1
                        2⤵
                          PID:2924
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:1
                          2⤵
                            PID:2320
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3648 /prefetch:8
                            2⤵
                              PID:4684
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5896 /prefetch:8
                              2⤵
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3732
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16439481935935862236,13645114633830634151,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3088
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3892
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3264
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0x514 0x510
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1568

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                Filesize

                                328B

                                MD5

                                ab31336301d9bb2c721cde3fce39d812

                                SHA1

                                63cc8b5fcaa2e7d8e2f948e3a10de3ae2a0460cb

                                SHA256

                                b3592cbd1b519c713a335d7a7b7d3344df441be51a3b1111aef24109d28aeea4

                                SHA512

                                056981cc6284b55dcfb0fcb783ce3dad3ac45d17b62042f0c13913934ffec28260cad62a6141699e5a66cbf05abc1d1c3e90f1ac1dab207993cc02e56b1a1749

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                ff63763eedb406987ced076e36ec9acf

                                SHA1

                                16365aa97cd1a115412f8ae436d5d4e9be5f7b5d

                                SHA256

                                8f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c

                                SHA512

                                ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                2783c40400a8912a79cfd383da731086

                                SHA1

                                001a131fe399c30973089e18358818090ca81789

                                SHA256

                                331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5

                                SHA512

                                b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                984B

                                MD5

                                ad43f9b10350cdabacab640942d1f57e

                                SHA1

                                b13716de0149f7a9a7f433bc94d7abe91a449167

                                SHA256

                                3aa8fe8aad32b54efea0c56bc2b8b60cec5b97e38a8b84980c769eb18f4dc669

                                SHA512

                                ad1f39dd72f2148ec4a01a3219acaef8150786072a216e6f14869a184c53f29044b5ae3f52c624bf23606a1942796cd2279fb1908b6ab48104bde87a809f64a8

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                f1be018023407d6c94878caffc24a3d4

                                SHA1

                                8f5b3cb01b07f01d1a1d61e80321796424546323

                                SHA256

                                9ac01b57f3ddaf04b8804777c3f6dea62b0cab66bf571d5cbe39305aae227f00

                                SHA512

                                eb295099c2e608a838685a2407f1c6592767a595aadb89dde3ea0319a9b2cbe778c77f6703de8aa84b3f414428c0b6d0bd70c41e15afdee027ae077a2644cd44

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                c66d1beddb6b403924f88f317e6b524a

                                SHA1

                                3e6d680e8385c13c8063630c6701005305e5c908

                                SHA256

                                4c853a3824956003316fda8521cb69a8b098e422c1f4530f08150a3ce3071d82

                                SHA512

                                0dbb4c2be4b729736bdf4c39c859f85049e1a02305dad89a6349c1e6cb47d131a7e2c1cb71c8ef88c1114563e26e8b9bb6e71ce5d806bc26485edd74f9e1bdc3

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                a65da07d8e71c7971a966ff48fb293c9

                                SHA1

                                dd52b05a4467960c051034c00db46eb03ee45397

                                SHA256

                                b376a238436ec814b5b892cb18d251e16714883ae37e6ddd4924488668d7d5a0

                                SHA512

                                74e1e6b83d24bf75759584847e12614689b85ed1f1995fd6bbe94d836154cb3654e20b23b47d0529f2cbd97f27da0743fe0b44d44b49a5c0c29535904f4b3026

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                7KB

                                MD5

                                2fc15bc68429e7f3ce3b8de7a18f76b2

                                SHA1

                                c47d314c10ad92913a74e15e710aa5a604e6d260

                                SHA256

                                75c6614753a5fc61678754405f8f3d4bb706f74b7d9f71a09d672718ec593c1a

                                SHA512

                                45a30ae2b110c24c533c55c8a1470c9499e4e3d6038020228f44d39753b6647a4062095c30f50aa7fa96c2dea3d9ab91a066a785cb3be3c91ecc11301c6170ef

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                Filesize

                                1KB

                                MD5

                                3e24ced80b06fbbbb448d7aaf46ca64e

                                SHA1

                                8abb8f2dd925536fbc0476801c8d2854003d492b

                                SHA256

                                1a25f29e83293c9bdf361e311a5fee382f21a9bd5516ab4d4623c323fb540b47

                                SHA512

                                2a7a04cd86f956dba508020a313c59859d731cb707aa3dbb1358433eb4ff401843247927139fe484079b0995caa3494adb4d0be70b24cb7212a76f03bef66a93

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                Filesize

                                1KB

                                MD5

                                1f010193ad20f03d18fb07040477545a

                                SHA1

                                f8716345fd2a1b96cd229343584de4723cb179bc

                                SHA256

                                4b70d0e0535b3891e34eb2cc20a2172de75d3142c06e4baefebc73a4ae725d71

                                SHA512

                                69e2c1769aae0d8fefddef6d5ee40ed80d0370f667d3f1a85d98d1497c7ffdc1095f861cddb5269f404ecf57ef747e0f752eaa124bcce98af49aee4f503e87f7

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58026c.TMP

                                Filesize

                                1KB

                                MD5

                                9c8c35c99d6579531c8c0a080dffbf7d

                                SHA1

                                54c53ed64d07f6eac8609d40ab5b002813cb4ca8

                                SHA256

                                68d990f49ce7dfaa6a10f9e408a656d374b3106b9a45a7c544f8af2034fe1aaf

                                SHA512

                                3870d6508457e228cf6c0cedc5d91b1b3b3cbf53266ab303e2c61d1ead6c0e033b094ea93b4d5220f8cb99357ab98781ea13c2056c71e2ace1e6553f31df18dd

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                454ea9fc30a74b165a6c54cc7b7c13d8

                                SHA1

                                ed4c4a9e036a2cb84496ecc93ba9bec522ff0a2e

                                SHA256

                                8a181ff946d4d7bbca35f453e8b09ef23fa1592f4372fb9e87780540fc720b14

                                SHA512

                                5490fcd68a68f7a7bb9fdfe498b6e1ac00060d5ebe7fedfd96ca5ce417be3c29df4a07b313931b7228f4830552fc9d14a96774c1ed53e59cad0b5eb846ccf11d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                34425e19cda1f9e5c9fff1f5600a2357

                                SHA1

                                c98f494a4a65341ee6d479a0b3c2692b4e9bdf2f

                                SHA256

                                f369d22439232dec1a4a30917e23699fe23e72ae4897d7e8d20afdbeb1b3ea98

                                SHA512

                                f1da5e0194422b3cc9b0d34dfa695f03b24cf98f9a02322ca90f96f9a9a303e811d0db7afee8bd98d01ca7faf4132450601f4dc55de65c985053e10106da6c57