Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 18:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1280296458817638474/1288640364609277975/OMG_CELEX_CRAK.rar?ex=66f9371c&is=66f7e59c&hm=96f63c99e12fa77440b14fe73bfbe68c23f975cd84e23387a4120fc6c210b9da&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1280296458817638474/1288640364609277975/OMG_CELEX_CRAK.rar?ex=66f9371c&is=66f7e59c&hm=96f63c99e12fa77440b14fe73bfbe68c23f975cd84e23387a4120fc6c210b9da&
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2152 GOONER.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zG.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zG.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 4396 msedge.exe 4396 msedge.exe 3640 identity_helper.exe 3640 identity_helper.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4880 7zG.exe Token: 35 4880 7zG.exe Token: SeSecurityPrivilege 4880 7zG.exe Token: SeSecurityPrivilege 4880 7zG.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4880 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4212 OpenWith.exe 4212 OpenWith.exe 4212 OpenWith.exe 4212 OpenWith.exe 4212 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4100 4396 msedge.exe 83 PID 4396 wrote to memory of 4100 4396 msedge.exe 83 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 636 4396 msedge.exe 84 PID 4396 wrote to memory of 1864 4396 msedge.exe 85 PID 4396 wrote to memory of 1864 4396 msedge.exe 85 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86 PID 4396 wrote to memory of 1616 4396 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1280296458817638474/1288640364609277975/OMG_CELEX_CRAK.rar?ex=66f9371c&is=66f7e59c&hm=96f63c99e12fa77440b14fe73bfbe68c23f975cd84e23387a4120fc6c210b9da&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9657b46f8,0x7ff9657b4708,0x7ff9657b47182⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5052 /prefetch:82⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2016,17097853569683635688,14236296430975263096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4616
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4212
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\OMG CELEX CRAK\" -ad -an -ai#7zMap8481:90:7zEvent243821⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4880
-
C:\Users\Admin\Downloads\New folder\OMG CELEX CRAK\GOONER.exe"C:\Users\Admin\Downloads\New folder\OMG CELEX CRAK\GOONER.exe"1⤵
- Executes dropped EXE
PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
6KB
MD52ffd48d42e184a2221aa60754e5acf77
SHA1da407700a88df7e00ae0d779286796a66b245e32
SHA25640da91e7845464383512ee24650e7775df220741cc04ff715a3f366d217fd464
SHA512d993923f60c9903bd02616dc6e33e505874c2fd1e08321e0bc854f655e4b469cf66cf3fbb08731bacbb4da53e0480bd8acb8e9db898fecca61b1c9119f0aec09
-
Filesize
5KB
MD5034e781f6bdd00a7326b84db02e8292c
SHA19dc34325b5a1acc7aea4a12a64e0e9e37d27e414
SHA2563a150bee3956b141882b152b0467e1cb5e57827e3284ed55261dec045f6cee50
SHA5125a610cf93be2aa204a5793f6e9e5119d354f43a6c5c881f42123cf9bf5208c7ccbf925a105a18a5e520ff9a3f44e085baf26b9f0d5740b6f2bdafe716e13dd8f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55109c66a73eca5395217486b060cae34
SHA1051f97150f5d65f123c86edc80b97c6e0fc7851b
SHA256f690147978682e72c676faf3a02743bd695babeedbb402aff93660c072437ec8
SHA512b63822dee4d0215047d873d78f625266897509cc65466c5bf7a7b8d35792e099ab291e2eed6ee94abf3fa9cc9e2f516c9ae87fcff21f62a0df54591789084c08
-
Filesize
10KB
MD541dc484d0094e393125f1d40c5c435e7
SHA161f80331cba399c1578e44be6626e92d6352102b
SHA256de1c86aab51ec29baeb6f976e9882882677394bac4f3c0cad4375bd0cc22da62
SHA5123cc5a1af346e7d0adaa67e57961216e2d7a0899fdf5778fda9259738bb25bd67005ea0d4d42b298f75e123d0186ed29b52f02df3b1de26634bc1f02c4c9f4d30
-
Filesize
1.4MB
MD5c771bf9c38858932d03c3c2cd403d81a
SHA1646262cff4426f42402fd1a49077dbf65bff63f5
SHA256d7c55f23aae7bdca012b73d8efbd81404c44e9e88d77dbf3f961edd54556839c
SHA5124773e49fc945696a05d863cd8f83c77e40a61fd9340b34584b9f146f210df48517a3eb37f65a2a19f060cf5a477824adb8f6f27580f51bdb7e22b30e54f2d4d8
-
Filesize
818KB
MD51a131bb6acec362c52b63dddd274e3a1
SHA1bdc91eaa3388dcd0ac382e046479b51dd94da139
SHA2569bbfd0d769dfc34f2bb9092da90010aa7c8c0ace082e85f5f9c6112f05d31116
SHA51233abc51abefaef1d35736ce92191bf5a172cb9be3a11d76260acff445bb7f75d347d44d94a59fc5739ba9924f93faef5f21a7634d7b3d720a559f4c8fa2d1eb6