Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2023, 07:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.cbc.ca/news/canada/british-columbia/lifeguard-overdose-prevention-device
Resource
win10v2004-20230703-en
General
-
Target
http://www.cbc.ca/news/canada/british-columbia/lifeguard-overdose-prevention-device
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 3180 msedge.exe 3180 msedge.exe 2772 identity_helper.exe 2772 identity_helper.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3180 wrote to memory of 3844 3180 msedge.exe 84 PID 3180 wrote to memory of 3844 3180 msedge.exe 84 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 900 3180 msedge.exe 85 PID 3180 wrote to memory of 4664 3180 msedge.exe 86 PID 3180 wrote to memory of 4664 3180 msedge.exe 86 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87 PID 3180 wrote to memory of 1500 3180 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cbc.ca/news/canada/british-columbia/lifeguard-overdose-prevention-device1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd125a46f8,0x7ffd125a4708,0x7ffd125a47182⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13866841504114254102,15470303404946364408,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fc99b0086d7714fd471ed4acc862ccc0
SHA139a3c43c97f778d67413a023d66e8e930d0e2314
SHA25645ef01f81605bfd96126d5520c5aa0304c7fa7d5fdb3e4d5b2dd2bf84e2afd96
SHA512c308fa3eda9235d67a506a5f058fefb9a769ec01d7b0d4f5a2397892cc4f8155301c55c1fac23bebacdd087ab3f47f1eacc9ff88eff4115a7d67aa7b1d6581a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\594657e6-af2c-4460-a26e-e648c7fa7262.tmp
Filesize24KB
MD596f00bbd6a174879c58220f95f0115f5
SHA1d3d7f82b0bf27daf1b3903bfe050c2d05422050f
SHA256644442e740a8c0bb20f712f6f84f5bf4a81bb29d4e9446b2832ca65618961107
SHA512e7c5e90eb85aee7b81b9c163f618ad3789a48b256040f6f00eee7fce52c60e1ff491bf0538b9c846fb115b73163710e46a45ce056e3b41ca59d88c421502ccea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD54ce0cd7310650679705b3671c84eb19a
SHA1b197b22e1f13aad835c67835f068b3de144c4e76
SHA2567ccb6ec639ddc9bde97fc7b3630f9ea724a0b83e0c43bc5efdd3cdcf402fa9a8
SHA5120d6082a82981a617d0eccfd986f9bb3f0af1cadb774dc26d3c549b35c87b033a5603f40abf2976c2c9e9dcff614dcfc679c4ed60e4480d98da5a828f19c78d6f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD596c9676d62cddaa99e808b2e399042b8
SHA1596f22c34d81422db354fbff92e5616c8b6bd184
SHA2565981bd668728ba554ecf9e2afea8adfdcf635685ac5901bd2ccab3b628dc35ab
SHA5127c643073f9b69b13b439aeed6f6e962e2d845e0fc1b5f00e13f3eb21d9e38fb69e158b22b171e60842c4e600f79482b6412db48bc5ce6998ad0887a0d7d98056
-
Filesize
5KB
MD5e9783cf4100ca3fbcb4697087136f1e5
SHA11484e34352d90c0263fb43a5a8fe02d9097cd81d
SHA2563b531c1e11c489510d739f543b57b305d7c6f09a70fe9f147cb1364e07799622
SHA512dac275a8292f4ec9834f7eae8fb3263d559fad5498a5842c5aedd0e03b5d8ee5f0409dbba4f8ae68018a601bd5a9006903ef177b4f8e0c3a3e0f33d7684900c2
-
Filesize
7KB
MD5da596d7c57f7de40da68304f2d786b60
SHA12d0ee3ea41257c9fd851f9c859d91b7f2e800eff
SHA256600570c98c74632d6b340a10483e9580b969f7ffc62e044295e4b4877b0407bf
SHA51209e65f4621e23bed03b533fb0e516646ee74b76a76e352ff71e1f4f2cf00a6d4580bf6bfbaa1c0cd3e1ffa3290ec762ec647c2302c7d799ef3a885333e65843d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5e344cf60c68debf438c90981f3750a22
SHA13402b22eb891505649da467e640c8e655e2a4976
SHA256484cd84ab631a99fc841fdf4b8a52a3d68233cc1250603a6b02430cbc482fe8d
SHA5129a2a27160d0c14c336dbbeab4da32207467c1893926fe2342395d64fba075f02f5a62de0d4183ebdf48109dc5395b0a7454ae198d79490189ce4cf413d9bcede