Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 15:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cyber-safe.vgrouplimited.com
Resource
win10v2004-20230703-en
General
-
Target
http://cyber-safe.vgrouplimited.com
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 2324 msedge.exe 2324 msedge.exe 4308 identity_helper.exe 4308 identity_helper.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe 4100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 4876 2324 msedge.exe 81 PID 2324 wrote to memory of 4876 2324 msedge.exe 81 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 3544 2324 msedge.exe 82 PID 2324 wrote to memory of 4104 2324 msedge.exe 83 PID 2324 wrote to memory of 4104 2324 msedge.exe 83 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84 PID 2324 wrote to memory of 4200 2324 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cyber-safe.vgrouplimited.com1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1d1146f8,0x7ffa1d114708,0x7ffa1d1147182⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7370156278151351675,15875650495140321749,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD56b82632d2f4fd6d69f07730bedb2b093
SHA18cdc166b506ac92bb8c5ed68d38edc4ca4f72f7a
SHA256302cdf74fb2fa8c3a87d68d9aa29a0438b4ea2e410831181142f00399e17e8d4
SHA512e653ab62318d84be34df2bd506dbf36139144258beb49cf6253cf9bf050be0a15b8bcbde1742dbc4419e6d0975205aea226c6ec34818bd1bf7cd6d5fd7a1ac50
-
Filesize
427B
MD5f94b8eb689a66735a99d48b37a41934b
SHA1a15e5f0c7dbf621e2a24fd4a744f5ceb7b328e85
SHA256e39f31d56ccb451cca297f7973cbacbcb9d3381bc0d97e91a89382a6c9418b7b
SHA51220ab96a760bc73ba5d894c01045257e5876c21396e2244f8b37f3dee522d3af14c9453ceaab648c15d5645508c208b5cf3f18534dc35edfafc488ad3a754a096
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5c7cd6b72967b48be65c6a4decc60d448
SHA1853cb91a5e07fefb1482924d9dadc209becba3e3
SHA256ddbaa2949c17cf64de4ea6da482e5558c33c5482ec5bea4d4c6fb835ef05bb2f
SHA51237a114aa88ddf4b50cec011ca1e1fe6969aba4fc78ad725c5ce50e8049323b93f6ca5e8203c678799f3488e05c427f0e873166c7cff59502aafc492ad4afb7bc
-
Filesize
5KB
MD5f3969dd8ea8b7d767130715de4deeea6
SHA159b982476ac4edee1c593f5044007302dfe6d156
SHA256c555279d10cf715b92e3a55e4c16b0c2d6c0cffbbc1cd268b3ddc566cab1683e
SHA512c04e06133f00c3e5a66a7e847c9b98f4b1d8412a8d11cf9893ce6c51db81bbcab77e7a8702afc3ef13033134d9dafd57b43bc22a21b707d861cdcf7e085692a2
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5ca535532969547fe0f8ff90e7640807a
SHA1f43aea7ee53f11c8dd7ef74bb26e983ed563ece3
SHA25641e1f7184a2f2ef35ec3129173a4f230b617b2d0a1095d45595e295b96761cf9
SHA512c2e0c8b81f5de394bbf085cc1632e526ca0f837d65b8a81558a78d81b1bd2c3bd3f6a747be19de0c0aceb2ee46d3e8030c19e90c1e71d9ee29e1c9d5196057f5