Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/11/2024, 21:18

241122-z5lz1azjby 10

22/11/2024, 21:15

241122-z38e8ayrhx 8

Analysis

  • max time kernel
    60s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2024, 21:15

General

  • Target

    https://cdn.discordapp.com/attachments/1285544843740708969/1309627983643938886/6474ef699648b5f34d8739a9a102836b27e4dcfe718404fcd09a428d2e89a973.exe?ex=6742459b&is=6740f41b&hm=12ace615ec56e9397c64221a08c691120e0caeb0ad609a5470990f51fea523b8&

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1285544843740708969/1309627983643938886/6474ef699648b5f34d8739a9a102836b27e4dcfe718404fcd09a428d2e89a973.exe?ex=6742459b&is=6740f41b&hm=12ace615ec56e9397c64221a08c691120e0caeb0ad609a5470990f51fea523b8&
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef9cb46f8,0x7ffef9cb4708,0x7ffef9cb4718
      2⤵
        PID:1280
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
        2⤵
          PID:1672
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3744
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:8
          2⤵
            PID:1548
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
            2⤵
              PID:2412
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
              2⤵
                PID:2920
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:8
                2⤵
                  PID:4416
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4840
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4564 /prefetch:8
                  2⤵
                    PID:4752
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:1
                    2⤵
                      PID:4404
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5684 /prefetch:8
                      2⤵
                        PID:4336
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1976,1758061037865443965,10055888274147584126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3804
                      • C:\Users\Admin\Downloads\6474ef699648b5f34d8739a9a102836b27e4dcfe718404fcd09a428d2e89a973.exe
                        "C:\Users\Admin\Downloads\6474ef699648b5f34d8739a9a102836b27e4dcfe718404fcd09a428d2e89a973.exe"
                        2⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2312
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:2304
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:380
                        • C:\Windows\system32\taskmgr.exe
                          "C:\Windows\system32\taskmgr.exe" /4
                          1⤵
                          • Checks SCSI registry key(s)
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:3436

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          56a4f78e21616a6e19da57228569489b

                          SHA1

                          21bfabbfc294d5f2aa1da825c5590d760483bc76

                          SHA256

                          d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                          SHA512

                          c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          e443ee4336fcf13c698b8ab5f3c173d0

                          SHA1

                          9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                          SHA256

                          79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                          SHA512

                          cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                          Filesize

                          186B

                          MD5

                          094ab275342c45551894b7940ae9ad0d

                          SHA1

                          2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                          SHA256

                          ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                          SHA512

                          19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          a632742fd844e47c7291d70def381da7

                          SHA1

                          c141d9aaf344086ff509445430d0e2e222933fe5

                          SHA256

                          53759496158d668f1b186efb87ad7f9659a4609eb0d1b9b1a35d61de6b8ec115

                          SHA512

                          0b789910ecf32308d7efe1f9473d26c96b5c536dfe880043a02549afd9ff508bcf0280c864965e153bd7092c63f8d78665f869bdb0015e5e3e1474bf8aeb5e20

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          bbbd191e9ab28db8e6206535ad43c8f2

                          SHA1

                          0100c6372962e79bf3ae751bbe3e7377d3ceb19b

                          SHA256

                          3372d8290fedf8dde6029e86b14cbec5d828010768d28205b7fc1cb048219d05

                          SHA512

                          bd87d3d82966581cc605fe0cdde3e9ace51ff12d3f5b83109f9974c68aa0c4b7064fb97db5d975c42b712fb4dc90e2f320e9d9f4109b24bef7e428d765ede155

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          b14af1c7ed8d9df52a66a24ff260f8e8

                          SHA1

                          eee4d29b3fa1465b64cbb2518bb643d0b6587c34

                          SHA256

                          718b92435fb8c7b5530dec0fae2485b9eff69d7d296023653c2c31de940b411b

                          SHA512

                          38e7550a5b17a869db9ef6cbe44091faf957c229472175dba63b25857c1d68e1fd3ed9139e04f8cd15815ec17daf5293ece2dca8d9fd3e5bbfd73dacdf3f6556

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          206702161f94c5cd39fadd03f4014d98

                          SHA1

                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                          SHA256

                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                          SHA512

                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          46295cac801e5d4857d09837238a6394

                          SHA1

                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                          SHA256

                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                          SHA512

                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          10KB

                          MD5

                          985863bd0e38583a28e39ad53e97d39c

                          SHA1

                          3d04652e6b0175a244182f8941c568a05db6d12e

                          SHA256

                          849a0bfba90624a5c8463715d7afed4261458fb60d6e4a0a6fa318b25d08a568

                          SHA512

                          b04799c9784a37b7e8909fcbdc9079e7bb29a4f64bfdc4f868cbec9729aea13eb77b6634dc2c9991978772c90be8962f717bc1d7c1c3f11deae4c5288757c683

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          10KB

                          MD5

                          bb363f776a83ca90d565e557a6297d68

                          SHA1

                          c7a8e362e4d997d68cc604f4a862623ba514a783

                          SHA256

                          989fc5895e7362ebdc0a456d2203ff144550ca0104fe475ad916933bd8fc8080

                          SHA512

                          509e4ff3a51a28294dbefde31d82a3cb742f9db661b283ad093d873ecffc3e246bd80e4fa3f0df4bdadf11481c64e4ec40e5856d0a28c9709f08beadca824ae5

                        • C:\Users\Admin\Downloads\Unconfirmed 42379.crdownload

                          Filesize

                          972KB

                          MD5

                          a035a6cfbe07dadcd1a4f89cc77d99b0

                          SHA1

                          ab53ba007f55daefb7dbf7d82fa135fe3046a208

                          SHA256

                          6474ef699648b5f34d8739a9a102836b27e4dcfe718404fcd09a428d2e89a973

                          SHA512

                          d03baddf8283857fa4bd61cb3b279413761143605a9bc2a26e7303ac9cf125cff5d2c263ca97e30e79928c839d5ad617bb2328f615d445ad81d05771e49a010b

                        • memory/2312-147-0x0000000005B00000-0x0000000005BAA000-memory.dmp

                          Filesize

                          680KB

                        • memory/2312-92-0x00000000059B0000-0x0000000005A42000-memory.dmp

                          Filesize

                          584KB

                        • memory/2312-88-0x0000000005E70000-0x0000000006414000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/2312-87-0x0000000000EC0000-0x0000000000FB4000-memory.dmp

                          Filesize

                          976KB

                        • memory/2312-192-0x0000000005C20000-0x0000000005C2A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2312-193-0x0000000006710000-0x00000000067AC000-memory.dmp

                          Filesize

                          624KB

                        • memory/2312-208-0x0000000007520000-0x00000000075E0000-memory.dmp

                          Filesize

                          768KB

                        • memory/2312-207-0x0000000005E30000-0x0000000005E42000-memory.dmp

                          Filesize

                          72KB

                        • memory/3436-201-0x000001BBF5600000-0x000001BBF5601000-memory.dmp

                          Filesize

                          4KB

                        • memory/3436-196-0x000001BBF5600000-0x000001BBF5601000-memory.dmp

                          Filesize

                          4KB

                        • memory/3436-206-0x000001BBF5600000-0x000001BBF5601000-memory.dmp

                          Filesize

                          4KB

                        • memory/3436-205-0x000001BBF5600000-0x000001BBF5601000-memory.dmp

                          Filesize

                          4KB

                        • memory/3436-204-0x000001BBF5600000-0x000001BBF5601000-memory.dmp

                          Filesize

                          4KB

                        • memory/3436-203-0x000001BBF5600000-0x000001BBF5601000-memory.dmp

                          Filesize

                          4KB

                        • memory/3436-202-0x000001BBF5600000-0x000001BBF5601000-memory.dmp

                          Filesize

                          4KB

                        • memory/3436-200-0x000001BBF5600000-0x000001BBF5601000-memory.dmp

                          Filesize

                          4KB

                        • memory/3436-195-0x000001BBF5600000-0x000001BBF5601000-memory.dmp

                          Filesize

                          4KB

                        • memory/3436-194-0x000001BBF5600000-0x000001BBF5601000-memory.dmp

                          Filesize

                          4KB