Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/10/2024, 05:11

General

  • Target

    Octane.exe

  • Size

    1.5MB

  • MD5

    a381acf1c9b1ab0a5912285f40fca081

  • SHA1

    e7307916e979f5e8524ef28272e4ba6c673f289a

  • SHA256

    8bb4b062348ad5767bc42bc0fb0600bd9970b63638058787a969cb7b04b29370

  • SHA512

    6c43b1139d4c2b90d99ab41fa21b22b36a544dcdc77e986b87bd7228aa6c9611c4b71d2e6d5aeca3d6fbed99089596edf0d24a5a52eac713cad1fec0dd93a754

  • SSDEEP

    49152:8M1msa5cMzWut9qYR9kqXfd+/9AManCL:8emHHWg9q+9kqXf0FtWCL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Octane.exe
    "C:\Users\Admin\AppData\Local\Temp\Octane.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:4880
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3084
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:3260
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4304
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2684
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2376
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3728
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:4320
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:4344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XCFODRP5\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\2V53MIUH\icon[1].png

    Filesize

    18KB

    MD5

    ce6d4cae2870aa2fb16ca98347c18303

    SHA1

    05dbfdd432f8371e33ea7c6e77ee1193a62cfc34

    SHA256

    ab31633472a410ff21b71810c9632dc72333fe981aad6db6141a2fb143bcbdc8

    SHA512

    ac37b4aa422961d140aab2cc46d521952aca4443535a95a120a9a257bda59c1ed5618419a24ed3553e529870f4c528bc2f6d773d1293372ba71c2c250bf9da80

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF86E162EF0CFBDF72.TMP

    Filesize

    16KB

    MD5

    7e9083376e774643eccc6b1d91cee58e

    SHA1

    4d8d3af618d440dbc15d0e014344a7864d689810

    SHA256

    8e4f31d6b0582f04be73c7717cecd8d69a9447915b7514465a0a5658db894b8a

    SHA512

    207f6e6b861e25524f117ad6d7e01f2e3ff80e93f04141847864de3c79a3b7e0bde7a6a3a3cbd7f06aa2a8c4b15e1f030749d73a752f39ae574924ee53c6030c

  • memory/2376-131-0x00000208EA430000-0x00000208EA432000-memory.dmp

    Filesize

    8KB

  • memory/2376-125-0x00000208EA330000-0x00000208EA332000-memory.dmp

    Filesize

    8KB

  • memory/2376-159-0x00000208D8D50000-0x00000208D8D52000-memory.dmp

    Filesize

    8KB

  • memory/2376-122-0x00000208EA300000-0x00000208EA302000-memory.dmp

    Filesize

    8KB

  • memory/2376-127-0x00000208EA3F0000-0x00000208EA3F2000-memory.dmp

    Filesize

    8KB

  • memory/2376-129-0x00000208EA410000-0x00000208EA412000-memory.dmp

    Filesize

    8KB

  • memory/2376-133-0x00000208EA450000-0x00000208EA452000-memory.dmp

    Filesize

    8KB

  • memory/2376-135-0x00000208EA470000-0x00000208EA472000-memory.dmp

    Filesize

    8KB

  • memory/2376-137-0x00000208EA490000-0x00000208EA492000-memory.dmp

    Filesize

    8KB

  • memory/2376-68-0x00000208D9400000-0x00000208D9500000-memory.dmp

    Filesize

    1024KB

  • memory/2376-139-0x00000208EA4B0000-0x00000208EA4B2000-memory.dmp

    Filesize

    8KB

  • memory/2684-54-0x00000148C7380000-0x00000148C7480000-memory.dmp

    Filesize

    1024KB

  • memory/3084-152-0x000001D93EC00000-0x000001D93EC01000-memory.dmp

    Filesize

    4KB

  • memory/3084-44-0x000001D9370E0000-0x000001D9370E2000-memory.dmp

    Filesize

    8KB

  • memory/3084-26-0x000001D938030000-0x000001D938040000-memory.dmp

    Filesize

    64KB

  • memory/3084-221-0x000001D9354D0000-0x000001D9354D1000-memory.dmp

    Filesize

    4KB

  • memory/3084-9-0x000001D937F20000-0x000001D937F30000-memory.dmp

    Filesize

    64KB

  • memory/3084-217-0x000001D93C1F0000-0x000001D93C1F1000-memory.dmp

    Filesize

    4KB

  • memory/3084-214-0x000001D93C330000-0x000001D93C332000-memory.dmp

    Filesize

    8KB

  • memory/3084-151-0x000001D93E4F0000-0x000001D93E4F1000-memory.dmp

    Filesize

    4KB

  • memory/4880-8-0x0000000073F80000-0x000000007466E000-memory.dmp

    Filesize

    6.9MB

  • memory/4880-0-0x0000000073F8E000-0x0000000073F8F000-memory.dmp

    Filesize

    4KB

  • memory/4880-6-0x0000000073F80000-0x000000007466E000-memory.dmp

    Filesize

    6.9MB

  • memory/4880-3-0x00000000095A0000-0x00000000095A8000-memory.dmp

    Filesize

    32KB

  • memory/4880-2-0x0000000073F80000-0x000000007466E000-memory.dmp

    Filesize

    6.9MB

  • memory/4880-7-0x0000000073F8E000-0x0000000073F8F000-memory.dmp

    Filesize

    4KB

  • memory/4880-5-0x0000000009640000-0x0000000009678000-memory.dmp

    Filesize

    224KB

  • memory/4880-4-0x0000000073F80000-0x000000007466E000-memory.dmp

    Filesize

    6.9MB

  • memory/4880-1-0x00000000005A0000-0x0000000000732000-memory.dmp

    Filesize

    1.6MB

  • memory/4880-227-0x0000000009020000-0x00000000090C0000-memory.dmp

    Filesize

    640KB

  • memory/4880-228-0x000000000A930000-0x000000000A9E2000-memory.dmp

    Filesize

    712KB

  • memory/4880-229-0x000000000BA60000-0x000000000BAD6000-memory.dmp

    Filesize

    472KB

  • memory/4880-230-0x0000000009380000-0x00000000093A2000-memory.dmp

    Filesize

    136KB

  • memory/4880-231-0x000000000BAE0000-0x000000000BE30000-memory.dmp

    Filesize

    3.3MB