Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe
Resource
win10v2004-20220901-en
General
-
Target
d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe
-
Size
9KB
-
MD5
63eea99c62061c7fecb41dba69be2510
-
SHA1
4ee8f644058ecbc8aa35f24e2c04cd55715df476
-
SHA256
d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f
-
SHA512
cc874544d535c31589b4fc9e6297beb06b81c7cdd29ca57be8ba68af348d05cba94116ad1bc62cd5304285044b2c2ff75a8f9e6ab487518a8f2892efe017bdb6
-
SSDEEP
192:/TK291wp9TMrf6UKUpt3TFbNehAi7YBE5A:/TR9ap9TM/DphTFZehAi0S
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220919133328.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\e149c105-288d-4bfe-b368-c65b1f3bc67d.tmp setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 3304 msedge.exe 3304 msedge.exe 5780 identity_helper.exe 5780 identity_helper.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4228 d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 1348 4228 d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe 83 PID 4228 wrote to memory of 1348 4228 d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe 83 PID 4228 wrote to memory of 1348 4228 d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe 83 PID 3628 wrote to memory of 3304 3628 explorer.exe 85 PID 3628 wrote to memory of 3304 3628 explorer.exe 85 PID 3304 wrote to memory of 1884 3304 msedge.exe 87 PID 3304 wrote to memory of 1884 3304 msedge.exe 87 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2220 3304 msedge.exe 93 PID 3304 wrote to memory of 2552 3304 msedge.exe 94 PID 3304 wrote to memory of 2552 3304 msedge.exe 94 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97 PID 3304 wrote to memory of 3356 3304 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe"C:\Users\Admin\AppData\Local\Temp\d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://humortadela.uol.com.br/animacao/animacao_pop_301.html2⤵PID:1348
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://humortadela.uol.com.br/animacao/animacao_pop_301.html2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffd518446f8,0x7ffd51844708,0x7ffd518447183⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:23⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:83⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:13⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:13⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4848 /prefetch:83⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:13⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:13⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4916 /prefetch:83⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:13⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:13⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:83⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:5364 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x200,0x22c,0x7ff728d15460,0x7ff728d15470,0x7ff728d154804⤵PID:5476
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:13⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:13⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4832 /prefetch:83⤵PID:6036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3152 /prefetch:83⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:13⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5264 /prefetch:83⤵PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,13638718355050307837,7450582301920440894,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6860 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688