Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 09:08
Behavioral task
behavioral1
Sample
ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe
Resource
win7-20240903-en
General
-
Target
ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe
-
Size
1.4MB
-
MD5
ab92a1d361e0f9e63879f0cd5bf29efc
-
SHA1
7c3004ec337ee81960fe344c2665f370edddd707
-
SHA256
ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f
-
SHA512
34150b3211147e3716780e596f45684e17193f2dd0b82f677980fbe27a1e93fbb6f4ae6250d0c31d3ebd9f625daf7f6950258582654a3539ebe326c2933ee740
-
SSDEEP
24576:Ieb5/lzyYJ1y8PzvqOshqgaBYtQj2FP65LYngAWWHOfu3AT6M3yu6SbdBueBOnzf:IefeYdqhqgaBYtQSh65LYnsWQzThCu61
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1696-0-0x0000000000400000-0x0000000000768000-memory.dmp upx behavioral2/memory/1696-92-0x0000000000400000-0x0000000000768000-memory.dmp upx behavioral2/memory/1696-124-0x0000000000400000-0x0000000000768000-memory.dmp upx behavioral2/memory/1696-126-0x0000000000400000-0x0000000000768000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?28879" ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 4396 msedge.exe 4396 msedge.exe 3536 msedge.exe 3536 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3536 msedge.exe 3536 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3536 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 82 PID 1696 wrote to memory of 3536 1696 ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe 82 PID 3536 wrote to memory of 3624 3536 msedge.exe 83 PID 3536 wrote to memory of 3624 3536 msedge.exe 83 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 2476 3536 msedge.exe 84 PID 3536 wrote to memory of 4396 3536 msedge.exe 85 PID 3536 wrote to memory of 4396 3536 msedge.exe 85 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86 PID 3536 wrote to memory of 4732 3536 msedge.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe"C:\Users\Admin\AppData\Local\Temp\ce0c81b2426e8a606fce1c2c02abf09075f25d8f1eaafb9930e27448c8ff876f.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.baidu.com/s?wd=www.mtmdfz.org2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f2b046f8,0x7ff8f2b04708,0x7ff8f2b047183⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5045957219540657162,6275552436727633131,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,5045957219540657162,6275552436727633131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,5045957219540657162,6275552436727633131,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:83⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5045957219540657162,6275552436727633131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:13⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5045957219540657162,6275552436727633131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5045957219540657162,6275552436727633131,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize864B
MD5ff70e5013ae8b7be06f69a626ea1938e
SHA1a6285bf8562b187809681fc2ed2dfecb2923da62
SHA2568cc374ae2001f243ad75212c9c866ccff06b65c79b41a74069f67c9749f9b3b2
SHA512540d0ab3d544178ae294dd71e962d6d1130f1322840d33dd9204f433ee232c023ffbcb2288324ad44fa4612e5fc151a09dab11dd5f2a9458bad8ac150572523a
-
Filesize
184B
MD5be5aeff2a68162f18c376598a46a4421
SHA1839b63103ff9a7414b37f002077912d30a9f73c4
SHA2565cb61d21ed14e9a9a029c1d214ef4f958f690f1db4dff27f8090cf54cb22075f
SHA512a6a5fb02c710d04baa71b2d16466b31802a250e5a48ac5f04539eceb0105a3b21b000d0552d55c571528fe337c1c6b957c66079ce64410b77cf3e5b9384e15a5
-
Filesize
6KB
MD5fa4323548cb5e328dda03db4b3747bd0
SHA14ee25494a7d33795f769d09e234e4d7706603dc9
SHA256a150c76910fc87be77f2cd2dbafc1488761a5a68c2c89f7e3557155e13176f4d
SHA512295496c05948c2575402a71cbb3986d10eec120d702f5f42b5d6a916acce2d08db4c262566ff7ef39a171b42e59ee3cf0e451acc687ca2c0c3647433ad574583
-
Filesize
5KB
MD5f8d2b866c3a7581ac25488c876e1fbf3
SHA16f885900ac8bc593b754a15cdff346b20dbded8b
SHA256e28d25fbc4fb39a49f3aa62e7d67d2d6b5b96d3f9f95899cb303d6201cd2567d
SHA512f0f7ac8904af2919f64edbb3a2f5d0014e16c177f6d950a766f315bf1a01272082f3fbdda211d9b5458c9edee466939ef1e7bee1bd7c622a3bb8263e6d5fefc0
-
Filesize
10KB
MD552607b8629ea1b005ded887ce18d4d56
SHA12552675b7aec230e1d600fde6f86f90edc6dc77c
SHA2562250accc3f5ecde4d287008ca816bd3a5388efb21bd82141c7fb626876815ebd
SHA512eb236ccd2afd072d409c72347bda95b7a0104fe95f5a71b757cd59fbc4baf2261bbd5ee10cc3474c06fbd95845a23f746d29a190636f424413b42c9e8d1fc801