Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

08/10/2024, 23:31

241008-3hpzxssfpg 4

08/10/2024, 22:36

241008-2jlhfsthlp 4

08/10/2024, 22:30

241008-2ex1paxgje 4

Analysis

  • max time kernel
    389s
  • max time network
    317s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08/10/2024, 23:31

General

  • Target

    d28f846d-ba29-46bd-b655-71fbde5a4165.html

  • Size

    490B

  • MD5

    49201f1b80595641826e3079d7af48e9

  • SHA1

    a387d15bd4f7e03b06b02c1a65995dcce9042923

  • SHA256

    02a6666479d5df5493309d83c6688e4c209b42fa009c4f273fa5f478780f51aa

  • SHA512

    20a4c6ab30f64d733a811f7d3f81715d41cb868ffe180d3e0a602def6f65897481908fd116ceebc87bc0390b60c05306f4f3b7a7b040b2451b3184f2c60df98c

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\d28f846d-ba29-46bd-b655-71fbde5a4165.html"
    1⤵
      PID:2360
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4200
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:656
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3824
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:792
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3260
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4424
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3428
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:1140
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:2700

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E49JWOHD\edgecompatviewlist[1].xml

          Filesize

          74KB

          MD5

          d4fc49dc14f63895d997fa4940f24378

          SHA1

          3efb1437a7c5e46034147cbbc8db017c69d02c31

          SHA256

          853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

          SHA512

          cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\369E8XL7\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\UIKVRLR5\favicon[1].ico

          Filesize

          758B

          MD5

          84cc977d0eb148166481b01d8418e375

          SHA1

          00e2461bcd67d7ba511db230415000aefbd30d2d

          SHA256

          bbf8da37d92138cc08ffeec8e3379c334988d5ae99f4415579999bfbbb57a66c

          SHA512

          f47a507077f9173fb07ec200c2677ba5f783d645be100f12efe71f701a74272a98e853c4fab63740d685853935d545730992d0004c9d2fe8e1965445cab509c3

        • memory/792-45-0x0000021092E00000-0x0000021092F00000-memory.dmp

          Filesize

          1024KB

        • memory/3260-52-0x0000014913770000-0x0000014913870000-memory.dmp

          Filesize

          1024KB

        • memory/3260-50-0x0000014913770000-0x0000014913870000-memory.dmp

          Filesize

          1024KB

        • memory/3260-51-0x0000014913770000-0x0000014913870000-memory.dmp

          Filesize

          1024KB

        • memory/3260-58-0x00000149131F0000-0x00000149131F2000-memory.dmp

          Filesize

          8KB

        • memory/3260-56-0x00000149131D0000-0x00000149131D2000-memory.dmp

          Filesize

          8KB

        • memory/3260-53-0x00000149131A0000-0x00000149131A2000-memory.dmp

          Filesize

          8KB

        • memory/3428-121-0x0000027B17040000-0x0000027B17060000-memory.dmp

          Filesize

          128KB

        • memory/3428-126-0x0000027B170A0000-0x0000027B171A0000-memory.dmp

          Filesize

          1024KB

        • memory/3428-134-0x0000027B17C90000-0x0000027B17CB0000-memory.dmp

          Filesize

          128KB

        • memory/3428-158-0x0000027B28E40000-0x0000027B28F40000-memory.dmp

          Filesize

          1024KB

        • memory/3428-162-0x0000027B17890000-0x0000027B178B0000-memory.dmp

          Filesize

          128KB

        • memory/4200-77-0x0000014A891D0000-0x0000014A891D1000-memory.dmp

          Filesize

          4KB

        • memory/4200-78-0x0000014A891E0000-0x0000014A891E1000-memory.dmp

          Filesize

          4KB

        • memory/4200-35-0x0000014A84E80000-0x0000014A84E82000-memory.dmp

          Filesize

          8KB

        • memory/4200-16-0x0000014A80C20000-0x0000014A80C30000-memory.dmp

          Filesize

          64KB

        • memory/4200-0-0x0000014A80B20000-0x0000014A80B30000-memory.dmp

          Filesize

          64KB