Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    25s
  • max time network
    17s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/09/2024, 08:23

General

  • Target

    https://get.activated.win

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://get.activated.win"
    1⤵
      PID:4588
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2016
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:316
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:660
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2772
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2432
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2084

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\VQDT4NKQ\favicon[1].ico

      Filesize

      2KB

      MD5

      0b54ef0f40df2eaff89144e3e493a2a8

      SHA1

      b2245c1386b2011ee92239b4e4abc8ed313fbe95

      SHA256

      d3ec7fd0c53085714bc39c0bfaf716dac57fe6a7571a0c341b99167ba260b08e

      SHA512

      7702ca1eda78f2bae58e8bcbdbbf70699b3da82a53d914c86e72e5c5cf3a4d76f856bb814014ff28e3eb4f561988f835e7261364e962d2b34adef5b9864832f1

    • memory/2016-16-0x000002278A620000-0x000002278A630000-memory.dmp

      Filesize

      64KB

    • memory/2016-0-0x000002278A520000-0x000002278A530000-memory.dmp

      Filesize

      64KB

    • memory/2016-35-0x00000227895F0000-0x00000227895F2000-memory.dmp

      Filesize

      8KB

    • memory/2016-75-0x0000022790C70000-0x0000022790C71000-memory.dmp

      Filesize

      4KB

    • memory/2016-76-0x0000022790C80000-0x0000022790C81000-memory.dmp

      Filesize

      4KB

    • memory/2432-56-0x0000015330400000-0x0000015330500000-memory.dmp

      Filesize

      1024KB

    • memory/2432-64-0x00000153409F0000-0x00000153409F2000-memory.dmp

      Filesize

      8KB

    • memory/2432-62-0x00000153409D0000-0x00000153409D2000-memory.dmp

      Filesize

      8KB

    • memory/2432-59-0x00000153409A0000-0x00000153409A2000-memory.dmp

      Filesize

      8KB

    • memory/2432-66-0x0000015340BB0000-0x0000015340BB2000-memory.dmp

      Filesize

      8KB

    • memory/2772-45-0x00000279EA910000-0x00000279EAA10000-memory.dmp

      Filesize

      1024KB