Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 18:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.salesforceiq.com/r?target=64b7f2da284e361e333f4734&t=AFwhZf19xazffGhay8zMrjXNDBJ1AtV1sQ1pNkkpWd3bxK0YaBMoG5rg_b9z5bt6hMJ_E7NugsUGtmeQOR1ijGSOTBHm6Ky8x-jlWyYHCNbHA2_pVM8mo7pgR5ykRADeJ0S-T2EVerL-&url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fical.fedexdigitalcalendar.com%2Fdigitalcalendar%2Fhome%2Fopenform%3Fcalendarguid%3DBCE1715A-DBF1-4B2E-801D-DA099D572E1F__%3B%21%21BL9GA0TyTA%21a9V3efsJ-6m20KmeeCflPNk_gRX3G22F5hwUxTie4zZjsW1HoWyaFISmX3fhJcL7aZSCvsYQBgrUXsHQ60zIZAzC%24
Resource
win10v2004-20230703-en
General
-
Target
https://app.salesforceiq.com/r?target=64b7f2da284e361e333f4734&t=AFwhZf19xazffGhay8zMrjXNDBJ1AtV1sQ1pNkkpWd3bxK0YaBMoG5rg_b9z5bt6hMJ_E7NugsUGtmeQOR1ijGSOTBHm6Ky8x-jlWyYHCNbHA2_pVM8mo7pgR5ykRADeJ0S-T2EVerL-&url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fical.fedexdigitalcalendar.com%2Fdigitalcalendar%2Fhome%2Fopenform%3Fcalendarguid%3DBCE1715A-DBF1-4B2E-801D-DA099D572E1F__%3B%21%21BL9GA0TyTA%21a9V3efsJ-6m20KmeeCflPNk_gRX3G22F5hwUxTie4zZjsW1HoWyaFISmX3fhJcL7aZSCvsYQBgrUXsHQ60zIZAzC%24
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4232 msedge.exe 4232 msedge.exe 4368 msedge.exe 4368 msedge.exe 4468 identity_helper.exe 4468 identity_helper.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4368 wrote to memory of 4348 4368 msedge.exe 84 PID 4368 wrote to memory of 4348 4368 msedge.exe 84 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 3120 4368 msedge.exe 86 PID 4368 wrote to memory of 4232 4368 msedge.exe 87 PID 4368 wrote to memory of 4232 4368 msedge.exe 87 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88 PID 4368 wrote to memory of 8 4368 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://app.salesforceiq.com/r?target=64b7f2da284e361e333f4734&t=AFwhZf19xazffGhay8zMrjXNDBJ1AtV1sQ1pNkkpWd3bxK0YaBMoG5rg_b9z5bt6hMJ_E7NugsUGtmeQOR1ijGSOTBHm6Ky8x-jlWyYHCNbHA2_pVM8mo7pgR5ykRADeJ0S-T2EVerL-&url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fical.fedexdigitalcalendar.com%2Fdigitalcalendar%2Fhome%2Fopenform%3Fcalendarguid%3DBCE1715A-DBF1-4B2E-801D-DA099D572E1F__%3B%21%21BL9GA0TyTA%21a9V3efsJ-6m20KmeeCflPNk_gRX3G22F5hwUxTie4zZjsW1HoWyaFISmX3fhJcL7aZSCvsYQBgrUXsHQ60zIZAzC%241⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf7b646f8,0x7ffbf7b64708,0x7ffbf7b647182⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12155574030018868783,6599643841312470324,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:872
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD59c45f82c442df37a44a8b417205f1d21
SHA123a698e8a064c860e986073d3349854fe40b4803
SHA25664d26de0fe6a436647307057af5c4b003809638f8bdba542679ecbc0975e85a5
SHA512cc0e78b3084a5e589cc8a141af2cc7135ca1c952c90c7159370380013c99cee37670e7a493af7c5f6f9bc71d9b9ee9f72279ff14f185d3108b2b1f88cb48040b
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD504be2adfd8bf6cd652408a025b3d7da6
SHA1bc18da920e5c9be93ba351e4131071a961963913
SHA2566e7482df2dd0c03f7993150497374e03772f8d7fd783279feee340ab9569d35d
SHA5125032fc18933b88c8a852385ac7b0bd7a8821474cd0fd18eafd4abdc8ca9a7c179c469778e5e74f4da02b261cc9f1fe25f79525479b5a53b9f33057568bc030e6
-
Filesize
5KB
MD57917b3023909b73a42094d4bd79393a2
SHA1682d8933ff7280f9375e0c56293b31746814e66e
SHA256ca19e862aaf653445c41a85a19441e896a0a673ee52495f24d5dbfcd6f23e66a
SHA51269dff16f0214d0a53aa183df5f96526fb35fcf8004a574a75d38baf2a0de4a5abbe55aa5903715a0db99cbea79c1daa9c25bf13e29c60089c63bf958355c433f
-
Filesize
5KB
MD56e2715407bb03e4a528982a3da9bd568
SHA1afe6ec420ac6b50f270045f5f6136fd0ab8309f5
SHA25645792b98e167a9dd57eabfe9eac123f6fb49897a1e78be70c3fa619d73f3ecb7
SHA512e2a496adeaaf3bc63138238c1ce5eda10e4257f7cc4881a43936458d419c039937d4d38466e7768f77a9d87e6b260a1ce3b3980678abecffea1712bb30ab706a
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD518746e683c97ee9a59bb40b53e25be11
SHA1d877b33cce0612c06cbb087ce7ba4a297dc20084
SHA256619d066534eb058ed2c85d6e8df037a4e7da4e266a49e14522e5f75e9da204f5
SHA5122bc74b8da30603e2bf85c540015222bd2fa8f68df265b0805614fc481f5e99ed71bc540b38d17c0adeb1f3310b80e5cfdaed32ecbfa544c0583362bb27734611