Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
e6f52ded3d0a1f0c419500503029590d1c66577008384a6fea62de1475a176b0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6f52ded3d0a1f0c419500503029590d1c66577008384a6fea62de1475a176b0.exe
Resource
win10v2004-20220812-en
General
-
Target
e6f52ded3d0a1f0c419500503029590d1c66577008384a6fea62de1475a176b0.exe
-
Size
144KB
-
MD5
0ae65cb9215a57e5595d5fa12fc6f51d
-
SHA1
72098a65a476036e8ca63b648639e892dc7e7b2c
-
SHA256
e6f52ded3d0a1f0c419500503029590d1c66577008384a6fea62de1475a176b0
-
SHA512
a9ad927fdd5d6c4132585f48bdc6a29f2d6b61af0d62aca9b966cafbbb6fdc53f1a210464adfcb626c2a9b8fa660e83e9f2fb1b264dff0db0d302435f76ae121
-
SSDEEP
1536:qxk31B7JRIUzhgmLeIEOoe6gGb9Gx8LAbM4LLmZivgaM8OKl:P317RLhjLvFUZGSLIM4WZivg4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\1569ab42-6ae2-4024-b92b-8a22f1ef2ded.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221108104403.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4120 msedge.exe 4120 msedge.exe 1480 identity_helper.exe 1480 identity_helper.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 4120 4732 e6f52ded3d0a1f0c419500503029590d1c66577008384a6fea62de1475a176b0.exe 79 PID 4732 wrote to memory of 4120 4732 e6f52ded3d0a1f0c419500503029590d1c66577008384a6fea62de1475a176b0.exe 79 PID 4120 wrote to memory of 1984 4120 msedge.exe 80 PID 4120 wrote to memory of 1984 4120 msedge.exe 80 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 3024 4120 msedge.exe 83 PID 4120 wrote to memory of 4996 4120 msedge.exe 84 PID 4120 wrote to memory of 4996 4120 msedge.exe 84 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86 PID 4120 wrote to memory of 5004 4120 msedge.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6f52ded3d0a1f0c419500503029590d1c66577008384a6fea62de1475a176b0.exe"C:\Users\Admin\AppData\Local\Temp\e6f52ded3d0a1f0c419500503029590d1c66577008384a6fea62de1475a176b0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=e6f52ded3d0a1f0c419500503029590d1c66577008384a6fea62de1475a176b0.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xd4,0x110,0x7ff8c35d46f8,0x7ff8c35d4708,0x7ff8c35d47183⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:23⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:83⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:13⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4872 /prefetch:83⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:13⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5636 /prefetch:83⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:13⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:13⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:13⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:13⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6688 /prefetch:83⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:788 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7ff6a5245460,0x7ff6a5245470,0x7ff6a52454804⤵PID:1648
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6688 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5444 /prefetch:83⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2303910574624642633,11509140432653011542,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5968 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=e6f52ded3d0a1f0c419500503029590d1c66577008384a6fea62de1475a176b0.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:4068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c35d46f8,0x7ff8c35d4708,0x7ff8c35d47183⤵PID:4000
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f647a9024e00f209b4882586b48a6d1c
SHA1825a1e51260086c4261315dbc9704e1848fe5ff7
SHA25677614c9d1cb42c41c0ce0415aecc9a20823ba79bdcdb8a27e90be7a16c57229b
SHA51284961cc97defa398b0053b40453db58198b3e5bd2ad59770707ed11eb282eff479664253e616427826b40377e6486cdc1676369324617e5b5b0262b904f2ca9a