Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
2ab6688f384868955807b8593439d559324cb7f91876e592cc77e52af9a665ae.url
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ab6688f384868955807b8593439d559324cb7f91876e592cc77e52af9a665ae.url
Resource
win10v2004-20220812-en
General
-
Target
2ab6688f384868955807b8593439d559324cb7f91876e592cc77e52af9a665ae.url
-
Size
372B
-
MD5
16397f1b477c8d606866e23ab78f8dec
-
SHA1
bd685306554e08efe03927e57c28f00dab1d0ab5
-
SHA256
2ab6688f384868955807b8593439d559324cb7f91876e592cc77e52af9a665ae
-
SHA512
73292235ac483fc1a2bed25f4239554884ff27d91f44ac017224e843e52085abd369a043cae29e8a8b32fcf860cc8c10bcf52ba2afed92026f91b2b7efeec2e0
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221211154501.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\b9d5b448-7e70-4861-a199-c7e36aba5a1a.tmp setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4520 msedge.exe 4520 msedge.exe 2328 identity_helper.exe 2328 identity_helper.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4072 wrote to memory of 4520 4072 rundll32.exe 79 PID 4072 wrote to memory of 4520 4072 rundll32.exe 79 PID 4520 wrote to memory of 4876 4520 msedge.exe 81 PID 4520 wrote to memory of 4876 4520 msedge.exe 81 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 240 4520 msedge.exe 84 PID 4520 wrote to memory of 4316 4520 msedge.exe 85 PID 4520 wrote to memory of 4316 4520 msedge.exe 85 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87 PID 4520 wrote to memory of 1344 4520 msedge.exe 87
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\2ab6688f384868955807b8593439d559324cb7f91876e592cc77e52af9a665ae.url1⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.taocode.cn/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffbd64246f8,0x7ffbd6424708,0x7ffbd64247183⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:83⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:13⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:13⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5356 /prefetch:83⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2076 /prefetch:83⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:13⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:13⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6316 /prefetch:83⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:1720 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff68a2b5460,0x7ff68a2b5470,0x7ff68a2b54804⤵PID:2276
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6316 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:13⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:13⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2544 /prefetch:13⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6160 /prefetch:83⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4212 /prefetch:83⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:13⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6064 /prefetch:83⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6036 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,6010767926871514824,1189337544208566615,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6244 /prefetch:83⤵PID:64
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3840