Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 14:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/mohamm4dx/SilverBullet/releases/tag/1.1.4 / https://anonfiles.com/l1vea5x0zd/Hustlers_University_svb
Resource
win10v2004-20230703-en
General
-
Target
https://github.com/mohamm4dx/SilverBullet/releases/tag/1.1.4 / https://anonfiles.com/l1vea5x0zd/Hustlers_University_svb
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2356 msedge.exe 2356 msedge.exe 3924 msedge.exe 3924 msedge.exe 724 identity_helper.exe 724 identity_helper.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 2136 3924 msedge.exe 73 PID 3924 wrote to memory of 2136 3924 msedge.exe 73 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 1636 3924 msedge.exe 84 PID 3924 wrote to memory of 2356 3924 msedge.exe 85 PID 3924 wrote to memory of 2356 3924 msedge.exe 85 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/mohamm4dx/SilverBullet/releases/tag/1.1.4 / https://anonfiles.com/l1vea5x0zd/Hustlers_University_svb1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff36eb46f8,0x7fff36eb4708,0x7fff36eb47182⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10501631287779976550,822159305406159527,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3548 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f6f47b83c67fe32ee32811d6611d269c
SHA1b32353d1d0ed26e0dd5b5f1f402ffd41a105d025
SHA256ac1866f15ff34d1df4dafa761dbb7dc2c712fe01ac0e171706ef29e205549cbc
SHA5126ee068efa9fbd3c972169427be2f6377a1204bf99b61579e4d78643e89e729ad65f2abcc70007fd0dd38428e7cd39010a253d6f9cd5e90409e207ddaf5d6720d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5271cba982990fead5467b6bbba51199d
SHA17776a7e2228de732167160ba89c23e7d5ee333e0
SHA2568fd589a6de5f71204d89577ba1ed0f309f59486133f105964f9368d22437b8d0
SHA5123618be79c8f707b3f414ee362d80d28327c888419c3b2e5d8e412d897d344042165c4461a21bedf6bd60e9267e124177508bae300075997a4b6ac18c1225a97e
-
Filesize
409B
MD5b12ee6b010e965ed924892682077404b
SHA1cc06dbdc7cf807fb8aa0f90749f5f07c2fcf55fa
SHA256fefc13d455791d6cc3d8bee48121ca6d7c21e147fd45c504f236bce95e0ea58d
SHA512b4178d1bc5b95dbabbc5dd1f902f2601b39904279d56b725a9c4aeacf9c27860c02207b1409298c911976540a30eb194c469f7fea64cb3a117755e57a56c3e1d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD550a8211b3cb999b8ff65854588b3c2d9
SHA1581d3ef4dbef4677d141a06165f56ca57a3edadf
SHA256cc18a4bf462ecc7e5d1f671caef52b6b255e0db16f574b6b780a56a23a20cd92
SHA512c467f6ecc7c36d8589a43cc39a263f10449b69b716a152e14b4b85e592efb87d930da2f94f20f41dd0f5fb459d67dfed565a521bf3b6d966f13596f873414301
-
Filesize
5KB
MD59bf3d1b85076a97595da12edc0730d68
SHA1b7237fc053240efd1c6dcffdfd1576cd669f75b5
SHA2560dd1a81e6cdf09900db0543aec232678fab0c11013565d6c609b7f955510b771
SHA5126feeb5240e0ffcb8b478478faec2b140319045b03594f839d9eb1d4d262d13a34e3b9a4d138c75f72628a6dcc120f24c44647e58f35595dd1cb254c6aece2456
-
Filesize
24KB
MD55544c64f2a8f49dabc19eb84267b1c9b
SHA1c5b78d63a8bab1c7b985f7ea2f268d0d7809071e
SHA256a1fcfee2974a77e76a7431a2069db301861ab42dd41769cead8697f41f5a497f
SHA51238c80d7c810441fc87beff38929473088cf426b0a25a30820d8a060f493350d99bb8521b314afe00578ea54648fce2aa4e55880a83a4f1048c56307991726565
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5bdfbb731b97473ebf67824aa348d4512
SHA1c5715f9f6302f3d53e3a28c3dc49b406f6c881c8
SHA2566e9a0c6bbd5e304feb82db25deed752f323939a75e12ac4e6bf7b2cc4588fdef
SHA51256a6c2e1bc1cddb7e28d2c189af99ff3eb49548e6f08d97be9ecfcf28dae5bb2d84a0cb78b3c360db021d6ebba630d2920d2821d3da6e5de4d45a5ed75943d6a