Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 11:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.festalles.de/hand-shakers499/
Resource
win10v2004-20230703-en
General
-
Target
https://www.festalles.de/hand-shakers499/
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3036 4840 msedge.exe 85 PID 4840 wrote to memory of 3036 4840 msedge.exe 85 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1332 4840 msedge.exe 88 PID 4840 wrote to memory of 1364 4840 msedge.exe 87 PID 4840 wrote to memory of 1364 4840 msedge.exe 87 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89 PID 4840 wrote to memory of 3808 4840 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.festalles.de/hand-shakers499/1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2e1846f8,0x7ffc2e184708,0x7ffc2e1847182⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,7980287156290214504,15444659239526795180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7980287156290214504,15444659239526795180,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,7980287156290214504,15444659239526795180,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7980287156290214504,15444659239526795180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7980287156290214504,15444659239526795180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7980287156290214504,15444659239526795180,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:4776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f6f47b83c67fe32ee32811d6611d269c
SHA1b32353d1d0ed26e0dd5b5f1f402ffd41a105d025
SHA256ac1866f15ff34d1df4dafa761dbb7dc2c712fe01ac0e171706ef29e205549cbc
SHA5126ee068efa9fbd3c972169427be2f6377a1204bf99b61579e4d78643e89e729ad65f2abcc70007fd0dd38428e7cd39010a253d6f9cd5e90409e207ddaf5d6720d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
184B
MD58a437d7083f8eef0a7c8f3301b22d717
SHA1933de1dbc5d5ba6ad845a3015fee7711d7257f50
SHA2562377e1466e0cc5fc8766bc740dfba36710a24578b7b60f768293ac7c07a2c072
SHA512c205c0052a78208f701678a6c13fd0d88a625bec48f766d4e39c2a4bdd48d057daa7201bc767084829e06ca1418ea8af832338d94c59773321f1b196ccb99523
-
Filesize
5KB
MD5ad69992ffaef3f93c31cccf08b27e2cb
SHA1ee9e8e83d7fa0ba233b2510cc4f2a382c9c6f926
SHA2569a83b25708983392cabcc98052a2f287cd46e04d2af1ce2571acad2f7f9dd611
SHA512d76b1f7db738bf1ec74ba257f719ec9d143bcdce52292a0e1f27c4e87b7ab47897420f11251a927b4f638ed046bf49da12bbde7aa16b5d91ca81f9da6a689c2c
-
Filesize
5KB
MD5e6a1f4fa68cd7b85c845f65c34857360
SHA1ff862af1937b570adf17c3abbf78259a3bfd4112
SHA2569ebad140a9485c77c5cbc9ca48faa53e0983ba30cda6f0d113587e5a1e69f58f
SHA5122a0b7334b0469a519b4b7f5d27aa7a823bdacf07c14af8e71ca631f5d897f4eb06c0806bb209775174817947b34a8a50167cfb60ace94a221463bc4b9ff47777
-
Filesize
24KB
MD55544c64f2a8f49dabc19eb84267b1c9b
SHA1c5b78d63a8bab1c7b985f7ea2f268d0d7809071e
SHA256a1fcfee2974a77e76a7431a2069db301861ab42dd41769cead8697f41f5a497f
SHA51238c80d7c810441fc87beff38929473088cf426b0a25a30820d8a060f493350d99bb8521b314afe00578ea54648fce2aa4e55880a83a4f1048c56307991726565
-
Filesize
12KB
MD578119af378c974ad586cc52336478e44
SHA1667aab850377e5a7ca0b2c1a9c0373cce7e3ee98
SHA256eced0906e91ecd412536050758d77fdd43db93ce1665350de0fb68bdeb4d6a16
SHA51273c4573c6ebe9d124c1b231ef26e2645280af28c11f757776ee9d4eba62404e76be7149fc0f0df714f9227a06ef98c3e95c42da67e89b8f29b9a2f3dc66cd907