Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 07:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://res.cisco.com/websafe/register
Resource
win10v2004-20230703-en
General
-
Target
https://res.cisco.com/websafe/register
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4224 msedge.exe 4224 msedge.exe 3772 msedge.exe 3772 msedge.exe 2640 identity_helper.exe 2640 identity_helper.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3772 wrote to memory of 3756 3772 msedge.exe 85 PID 3772 wrote to memory of 3756 3772 msedge.exe 85 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4484 3772 msedge.exe 87 PID 3772 wrote to memory of 4224 3772 msedge.exe 86 PID 3772 wrote to memory of 4224 3772 msedge.exe 86 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88 PID 3772 wrote to memory of 4452 3772 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://res.cisco.com/websafe/register1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3b7f46f8,0x7ffc3b7f4708,0x7ffc3b7f47182⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 /prefetch:82⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11232036907693561663,10131779332378763867,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4780
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5fb9208af3e61698d45352aaebe2176b0
SHA1fa67311a3889aeda7d93d4f9924e73a61fc11806
SHA256052bb7b5eb77ce15df655544937320c4086aa6c5ed4b879a0b21f49e9ba60717
SHA5127c7c4e2aff11bb8f435b2d48c79c530fd660dff23f6479b29b2c6568b5c95d343644a723ec35754c299bad9d804897fab1bd4c0954d5bec927f7dcbbb8ecbc65
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5f3c124d4d21ed7422f10b469e9b1e0d6
SHA1789316591c5bf11716ad55a1c4ba888dc500e641
SHA2563e6881d9196d791ecf9c499d1f97d741c7d6b0f56a2c2db910635702856c70c1
SHA512c9621b7bd960948a8e04737eb790abb59ba0f9dc3b49f4123f5d2419a4fda4eac53a21ab393de06c1558f271158bad60294addef9ef272dba2edc156ecb68a64
-
Filesize
5KB
MD56a7fa433b917a68ff37116dc31b36722
SHA1d2174b15a257e58edb86c6433482023b30f8095a
SHA2569e4741008cdc3b286ffcb5c2826bc422bef5e87faa16dd593fc67846441c6c61
SHA5127ce5233e89a5925ae82ab7b710cb2fac06b27f0104d21efd4e43424d1d0295aac9e472ea560c895253e98301067cedf303c39b37d59d474453a2175fdc9f3820
-
Filesize
5KB
MD550011d5c13e37749164e4d8e15800909
SHA16bd761cde623a53d60b35c6169e74c1ed24c7d4e
SHA2565822d3e9768d3bc96d0d827b0e379da3c6e5d16c1642b7c9931b7dbc19430730
SHA512a100fd359845bea060affa7d1c71233a00595038d2437f55f70edbdb26a6af3ee9531ad519d986967d6e5072baebe6123c11561615d94d2c5dc5f66ad8380093
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD511a5dcddb4abf9a3650e1ab42af44d84
SHA182861b3882f6527104bd7de88af27ffce83c1952
SHA2564caa37a3005929dcabc6b958ed81fc4f5c3027393f1abd9d9f1f2168e900faac
SHA5122b01cbce7e7b23ec62d46bd4e280810896d9b6d65ffc077ee7f613848bf92d69ed3623df09abe0d3271de011b35156a3763236fa5269df956bc49b35297aafce