Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 13:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ehi.mitarbeiterangebote.de/login?wt_mc=news.2023.8.A.None
Resource
win10v2004-20230703-en
General
-
Target
https://ehi.mitarbeiterangebote.de/login?wt_mc=news.2023.8.A.None
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 232 msedge.exe 232 msedge.exe 3912 identity_helper.exe 3912 identity_helper.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 232 wrote to memory of 540 232 msedge.exe 82 PID 232 wrote to memory of 540 232 msedge.exe 82 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 2052 232 msedge.exe 84 PID 232 wrote to memory of 5080 232 msedge.exe 83 PID 232 wrote to memory of 5080 232 msedge.exe 83 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85 PID 232 wrote to memory of 4316 232 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ehi.mitarbeiterangebote.de/login?wt_mc=news.2023.8.A.None1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b73246f8,0x7ff9b7324708,0x7ff9b73247182⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10411389575174052111,15254770314685773430,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1756
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD570e2e6954b953053c0c4f3b6e6ad9330
SHA1cb61ba67b3bffa1d833bb85cc9547669ec46f62f
SHA256f6e770a3b88ad3fda592419b6c00553bdadc50d5fb466ef872271389977f2ab4
SHA512eeacb0e62f68f56285f7605963ca9bb82f542d4e2ccc323266c08c9990cecdebd574e1ab304ae08ea8c6c94c50683180f83562f972e92799ebbcfcd8f503fb5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5cc59a7a688938067c9b00f41cacde27e
SHA1e44639ebedc6e2b543dd3b9ac4f686d9f13a310a
SHA256228371f76067d3cbbaaf11d4b55b9c304da16d9fe37b57754f7f42522f667b8c
SHA512354dd94ec8493ad93152e23e93165432bb96acfc60a70e77f0b0ffaa4f47f387833622774df0cfc59ae28c77d7e3677c725493b9eef5dad3864f88af3a707d4c
-
Filesize
431B
MD539903db6963b8ba1309d667129b67873
SHA1859d3853428f603961d5202799142e1f00ef6882
SHA256b7b227ad192913119ea18ca2f825459443961e44c4be18ec1c112fd7adb39b08
SHA512758128724c50e2763479c5e902b5eb798a3ef1bcd85348c529ecbf241d1e4d052d91bc1d066f4943feee37498f2c38a9a3705426d1e7494f090c5d2b636dd37f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5028c85039ec2e7c00a7874747a407f30
SHA18a01d673142530d492234cd8d0d82c75e39cad76
SHA256868caf84adaa8e0ad944fad0c52c13f713d92f6e31c451e63918995bce4c677e
SHA512de317997e787702071bfd144949f735e7075a624e59df101c47e6a557e2b83ca0b2536cc49ded9689d58b592c401284aaa37db1d745004a082ecd1449c3f81d2
-
Filesize
6KB
MD59b4b58cccee7bcac38fa37d75759e5bc
SHA1e7b825b23e95c3e9f22d6d7f79639ab142892cf5
SHA256d63a4a8723151cbc12f104a421e17fe4521c691f4b2398a7438d55e757675178
SHA5124d9bfdc229f2f27b5c49f02af1ea8560c6b58342d2f250e42b059f04bd1054e2e6f480d60be1a29e7e8fa472356a6da35c0897ecce624eefffd60aa61f58b917
-
Filesize
24KB
MD55a478f1e08816969e8214f982850b754
SHA11cf5e7192f3c6e31c7e27b6cb34ebf89036eec0c
SHA256665cf5612c61412c9acc928b1e155c8f11ae83905ce614d9a1a7ad72cc0fd489
SHA5127e7ff60c157841f6f5bb206ebbce29f6df3a6c0c671805415ad7226654e13da49ad76e39a6d0afe28992348f3b5685ecacbfb44178fd61998c54caebbfd97832
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD561cd95ddaae941f974407869346d9812
SHA10e41d5c3fe475dac3621d4e9af10665642b55c87
SHA256111039a8f477d9686fc42e1c133fb13f84c54a2f2071c85f33f9682511f1aa5f
SHA512735fdaa70414247c002a19ac777c6c133e13ad2dd8ed1bf7ddde707602ae69966c6e9c607b7cf754b0f3335bf637ae41bbf664709c79ee946d5d6ad01b09b710