Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2025, 06:55

General

  • Target

    df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe

  • Size

    1.7MB

  • MD5

    9bce9dae679419198574f4c9837085db

  • SHA1

    62a24f1ee057e936f3bf01749ecd7e3675d0f10d

  • SHA256

    df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8

  • SHA512

    9647610d36379a789ab45e21b1997eeff560058cf55374b0a404be9474becca566ec0dd97cbb49b8d54da811bb5fe1e4d2e3e6de9b8fd57825181d611019f467

  • SSDEEP

    24576:6G5C8hr/Vz9ih9i38xVEL/QQPL6BH8kQqNgQ+uH6FqgtMok4+iL:I8hJz8eDsH8kQqNs86F1yU

Malware Config

Signatures

  • Detects Trigona ransomware 14 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Trigona family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Drops startup file 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 4 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe
    "C:\Users\Admin\AppData\Local\Temp\df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:608
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTM1MzY1MjkyIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:1296
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\MicrosoftEdge_X64_133.0.3065.59.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:9712
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:9468
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff645dc6a68,0x7ff645dc6a74,0x7ff645dc6a80
        3⤵
        • Executes dropped EXE
        PID:10472
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:10848
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff645dc6a68,0x7ff645dc6a74,0x7ff645dc6a80
          4⤵
          • Executes dropped EXE
          PID:10904
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:10176
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff604da6a68,0x7ff604da6a74,0x7ff604da6a80
          4⤵
          • Executes dropped EXE
          PID:10736
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:9332
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff604da6a68,0x7ff604da6a74,0x7ff604da6a80
          4⤵
          • Executes dropped EXE
          PID:9404
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:9364
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff604da6a68,0x7ff604da6a74,0x7ff604da6a80
          4⤵
          • Executes dropped EXE
          PID:9236
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
    1⤵
      PID:10416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-1318997816-2171176372-1451785247-1000\desktop.ini

      Filesize

      2KB

      MD5

      dc5870077cfb920954e41e757c872da6

      SHA1

      959b877a2676106230935d7ac33350d700ed7e8e

      SHA256

      3a0975a598acb6360c47f78a51e89eb06707cd937b89da23f5c84f60ab1f63e6

      SHA512

      d9d8b37417ca7ecae25021c9ca73f59d46df086a2efb767b0ce0e795f38d332c1a15cc149ddb1590d138e431aa7ae3cef068c15f9284c29346e092f97882b1e7

    • C:\$Recycle.Bin\S-1-5-21-1318997816-2171176372-1451785247-1000\how_to_decrypt.hta

      Filesize

      12KB

      MD5

      52844afcd75c69cd5a4d198be5e356ec

      SHA1

      8a460c8a6b8d4cdb22358c02e327c5213254825f

      SHA256

      915aa83f49373899099c7124f221b99d075f04f42f1a956c4e759aaf2638b8ae

      SHA512

      9e8781935a977868446fc9c4512165146e24a0fa02699089e1a2ea73c1306b3c109e8ae24b1363ec419758f343b9b16d841c106decca13db88ac11b615f19874

    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2341466A-4AB6-48E0-A69F-394F5D7B3F0E}\EDGEMITMP_C4AE9.tmp\setup.exe

      Filesize

      6.8MB

      MD5

      1b3e9c59f9c7a134ec630ada1eb76a39

      SHA1

      a7e831d392e99f3d37847dcc561dd2e017065439

      SHA256

      ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae

      SHA512

      c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e

    • C:\Program Files\MsEdgeCrashpad\settings.dat

      Filesize

      280B

      MD5

      2c9a268de3a9d95cacdf4a74059fc100

      SHA1

      1bc3491f2dfb1587174f4fc0d3eecdc5850d89ab

      SHA256

      df40944086a69c85a9e9e9a531ae4edec7a8f28f46341782fb94d9b445e3fed8

      SHA512

      070ffdfc8a127d9d74691e66deaecd738bc2000a81f23989d7c9392d7ee0e68142531a7abc7d53105f4a2a22be4e620a0399ee9c9d1bf7f9b60308629380502d

    • memory/608-6-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-3-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-0-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-2863-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-5-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-4519-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-5186-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-10-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-10071-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-18190-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-1-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-22872-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-24439-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB

    • memory/608-24440-0x0000000000400000-0x00000000005D1000-memory.dmp

      Filesize

      1.8MB