Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2024, 02:11

General

  • Target

    Ryzen DRAM Calculator 1.7.3/memtest.exe

  • Size

    40KB

  • MD5

    2da23869191b9b93106967d1924e6342

  • SHA1

    ef072f822fa270026c7243e8ad4cf5fccccf2947

  • SHA256

    637d81054008795d8ba5115682fe5979e26c3691d3a8ac7960bdf1a69436907e

  • SHA512

    80a8560304f08e1ee7c77de19d100aab00e8932147507486d6f4558760459a57633f013e907b93263fc41c158ef0a4b061708d036165d9668ba90405de3ecf27

  • SSDEEP

    384:YJDsy4wiAjbceYC87TfUjO1RMuQJL3LNQu/+Hqo71a1soaxFWHxujgHjKDuucNzT:YalvAjbceg7zlc9bGC+Hq+2/aGHF4M

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ryzen DRAM Calculator 1.7.3\memtest.exe
    "C:\Users\Admin\AppData\Local\Temp\Ryzen DRAM Calculator 1.7.3\memtest.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://hcidesign.com/memtest/copyError.html/ver:6.0%20flag:4%20xy:0
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3260
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec67246f8,0x7ffec6724708,0x7ffec6724718
        3⤵
          PID:4644
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 4644 -s 660
            4⤵
              PID:1992
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,17995888829446636488,9022499630356164171,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
            3⤵
              PID:1180
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,17995888829446636488,9022499630356164171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:3
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1516
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,17995888829446636488,9022499630356164171,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:8
              3⤵
                PID:2872
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17995888829446636488,9022499630356164171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:1
                3⤵
                  PID:4360
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17995888829446636488,9022499630356164171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:1
                  3⤵
                    PID:4640
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 1112
                  2⤵
                  • Program crash
                  PID:3028
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:1632
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:8
                  • C:\Windows\system32\dwm.exe
                    "dwm.exe"
                    1⤵
                    • Checks SCSI registry key(s)
                    • Enumerates system info in registry
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2964
                  • C:\Windows\system32\dwm.exe
                    "dwm.exe"
                    1⤵
                    • Checks SCSI registry key(s)
                    • Enumerates system info in registry
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2620

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                    Filesize

                    152B

                    MD5

                    e55832d7cd7e868a2c087c4c73678018

                    SHA1

                    ed7a2f6d6437e907218ffba9128802eaf414a0eb

                    SHA256

                    a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                    SHA512

                    897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                    Filesize

                    152B

                    MD5

                    c2d9eeb3fdd75834f0ac3f9767de8d6f

                    SHA1

                    4d16a7e82190f8490a00008bd53d85fb92e379b0

                    SHA256

                    1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                    SHA512

                    d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                    Filesize

                    5KB

                    MD5

                    c811d02b05895949c79e982051b952d0

                    SHA1

                    44e04edb153d66c09d8c09c3cdb65c9dbfb71961

                    SHA256

                    21b5ce35e200205bba7dbe4882f6e7d26868e7d5c5d0c659aa727a8faf508003

                    SHA512

                    da766e3536c700c95d67f7d340b7335d1c8d15e1f1af8ed94a781e265d8e692a1a2259c13102bd1c92bec7f2772af21fd62147c458be509f21bfcd5a7d9ca724

                  • memory/4824-34-0x0000000006960000-0x0000000006981000-memory.dmp

                    Filesize

                    132KB

                  • memory/4824-25-0x0000000005430000-0x00000000055D8000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/4824-24-0x0000000005360000-0x0000000005422000-memory.dmp

                    Filesize

                    776KB

                  • memory/4824-33-0x0000000006950000-0x000000000695A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4824-23-0x0000000000AF0000-0x0000000000B14000-memory.dmp

                    Filesize

                    144KB

                  • memory/4824-38-0x0000000006FA0000-0x0000000007023000-memory.dmp

                    Filesize

                    524KB

                  • memory/4824-31-0x0000000006890000-0x0000000006923000-memory.dmp

                    Filesize

                    588KB

                  • memory/4824-17-0x0000000004C50000-0x0000000005258000-memory.dmp

                    Filesize

                    6.0MB

                  • memory/4824-37-0x0000000006E20000-0x0000000006E38000-memory.dmp

                    Filesize

                    96KB

                  • memory/4824-32-0x0000000006930000-0x000000000694B000-memory.dmp

                    Filesize

                    108KB

                  • memory/4824-35-0x0000000006990000-0x00000000069C4000-memory.dmp

                    Filesize

                    208KB

                  • memory/4824-26-0x0000000000B30000-0x0000000000B3B000-memory.dmp

                    Filesize

                    44KB

                  • memory/4824-29-0x0000000005C10000-0x0000000005C27000-memory.dmp

                    Filesize

                    92KB

                  • memory/4824-27-0x0000000000B40000-0x0000000000B5D000-memory.dmp

                    Filesize

                    116KB