Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 06:34
Behavioral task
behavioral1
Sample
ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe
Resource
win7-20240903-en
General
-
Target
ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe
-
Size
13KB
-
MD5
f3cd8c95f733200bfd9d5dcacb838f30
-
SHA1
431d865fcbcbc5bade51bd0e88c8df65282b7cac
-
SHA256
ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4
-
SHA512
97a49ca386bf5929405b2a9078cd08857fb834e6a6bef0cec355a0feeb4ffc168a18269e3e1e490026ce4f06fa6dc52ab668e4547176c4fde1782c4f11ff4b9b
-
SSDEEP
192:LUL9dBH9j/sAacntGaaQen27LDpgi+S1rAr9ZCspE+TMwrRmK+vhOru:mzacntDr7HMAReM4m/
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4468-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4468-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 4604 msedge.exe 4604 msedge.exe 1776 identity_helper.exe 1776 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4468 ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4604 4468 ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe 82 PID 4468 wrote to memory of 4604 4468 ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe 82 PID 4604 wrote to memory of 4716 4604 msedge.exe 83 PID 4604 wrote to memory of 4716 4604 msedge.exe 83 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1460 4604 msedge.exe 84 PID 4604 wrote to memory of 1888 4604 msedge.exe 85 PID 4604 wrote to memory of 1888 4604 msedge.exe 85 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86 PID 4604 wrote to memory of 4156 4604 msedge.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe"C:\Users\Admin\AppData\Local\Temp\ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ads.alpha00001.com/cgi-bin/advert/getads?did=432⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd21b46f8,0x7ffbd21b4708,0x7ffbd21b47183⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:23⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:83⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:13⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:13⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:13⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:83⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:13⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4296 /prefetch:13⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:13⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:13⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:13⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11297280391353692568,5301681086874843596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:13⤵PID:2248
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
6KB
MD5db44ee90b9757aca5ae91ce3b663c2a7
SHA1b00b4b0f88cf4d1bf5bfd8324947ca132c8b45ae
SHA256b76468e85c50be1315c154cb3dd0d2b3aac0ebedf96b4237041c5c7b18d800f4
SHA512ee6fdbc2e052607299077034fcdc12716757f93415c3c12d53229fac6f585c326d41688675e3a12ded35eaa92243728009893800cf7b682e022718c45a948cd1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f5ab4a55-3527-4b87-b59f-bc54edaaa364.tmp
Filesize5KB
MD5f1eeb231e6aab46f7450052a6c2b48da
SHA122d505f554687491c1cd28d810e68c133f9bb375
SHA25621b99f0ef36effaf6149136c10721aa1247b244246ba7a89cd03ca58cb16bc78
SHA512761c5e0fe0813aa5fea941c6a458964da64b39ca8ea42aff30d21e21c3fdad160c33644b9c5a0318a3488dac15b2bd3e09ea9bd3580f2a8bf4f9bd0c5ef77f27
-
Filesize
10KB
MD52d536df403557dde118b777ef24e7a99
SHA1aa4c64610fe16444fc91e765c66b1c85a5e947b5
SHA2566c42745ddcbb64e50e5c0f1d0a7f915e6f3b5ee092f3bf77e23107d67397da94
SHA512d431da34b50f6a6fff9ca9710397f0fa917a3aa027f0a5a26de727640a3c8f9e1a8044a8ec38e1b53eccc692e3722f94f7f8eb4c0b12b561f626cef71075b8ba