Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 12:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pic2go.com/redir/vyuzVideo/6177934327021568/1278?l=https%3A%2F%2Fdp3ap2kb.tabalongkab.go.id/cj/4lgkw6/bGFycy5rcm9nc2dhYXJkQHNpZW1lbnNnYW1lc2EuY29t
Resource
win10v2004-20230703-en
General
-
Target
https://pic2go.com/redir/vyuzVideo/6177934327021568/1278?l=https%3A%2F%2Fdp3ap2kb.tabalongkab.go.id/cj/4lgkw6/bGFycy5rcm9nc2dhYXJkQHNpZW1lbnNnYW1lc2EuY29t
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 1232 msedge.exe 1232 msedge.exe 4848 identity_helper.exe 4848 identity_helper.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1340 1232 msedge.exe 81 PID 1232 wrote to memory of 1340 1232 msedge.exe 81 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4436 1232 msedge.exe 82 PID 1232 wrote to memory of 4868 1232 msedge.exe 83 PID 1232 wrote to memory of 4868 1232 msedge.exe 83 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84 PID 1232 wrote to memory of 1180 1232 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pic2go.com/redir/vyuzVideo/6177934327021568/1278?l=https%3A%2F%2Fdp3ap2kb.tabalongkab.go.id/cj/4lgkw6/bGFycy5rcm9nc2dhYXJkQHNpZW1lbnNnYW1lc2EuY29t1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4c7446f8,0x7ffb4c744708,0x7ffb4c7447182⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12867857740179434622,14303055008559162970,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b5f5369274e3bfbc449588bbb57bd383
SHA158bb46d57bd70c1c0bcbad619353cbe185f34c3b
SHA2564190bd2ec2c0c65a2b8b97782cd3ae1d6cead80242f3595f06ebc6648c3e3464
SHA51204a3816af6c5a335cde99d97019a3f68ade65eba70e4667c4d7dd78f78910481549f1dad23a46ccf9efa2e25c6e7a7c78c592b6ace951e1aab106ba06a10fcd6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize600B
MD56d8073ee44de4bb07356a76795677ceb
SHA1901dde87b934e190d3c6365a889c309c69975b64
SHA256e6413897390ea19144bff2c83cbef79c747cf9e382985804f6f67f37fa0488b9
SHA512052dc7fb566899c3375987bca29e7a2e3072196589de3f5101d10c1837811efee4466687c5d71de969a5c1b41eec3b1a33677c679ba20ca3a46893dbd90300f3
-
Filesize
452B
MD5260f9ef45863181b3372d5804a614d1d
SHA1cd2f54bb403e59283edc87d09213aa16ea8180e3
SHA256241fafd4726769189d27648be1597c7e154e17200dae6031f614bf01b42ff47d
SHA5125e9815069d64006ddbd75c012c36127fea7a74f5792a90879c503d330fee8b3f3dfb47485d174d006255100be5e08656d5bee6fe1e388bac799759953c18562f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD560cb1d1c454831c6958f210d8d69d43d
SHA1f9aa758d1bb3f7e01ce809d205583ca67664a1ff
SHA2561f350c158b5d2444a43e0309c350afef7e912635c8d96b8ce7647183f3e06600
SHA512f2c7410fc8f2a077c0aa9d21e10d0dac8d3a1f2e3fee63c72b110bbda88bb85e5b520aa11d60c90b101d48fc2cae593f4447ae2c89b61eb7683d26b695d6c4fb
-
Filesize
5KB
MD53e0d367e8ea71ef9d738bebd277275a2
SHA1df5d0216c8f33a60f3a8ee3ea7b519299b63f009
SHA2568550a41f40f2791893cc0c9396623b3d0740b30d0d6b8dba340b6c96d2a2912c
SHA512beadb88b304a8b735eea7f99bb8ab668df36feb5644a78d5b2410f63cbba3df22ad3014a6cce8a08237c0cf5c09ba6b1d2e16d19f7b01850ae07dd0787a0feab
-
Filesize
24KB
MD529213338df67d29d6454ee5d61ad3970
SHA18c69ca76a2e639060d5ce835a9600e6ea3764a83
SHA256d29fc0d97fa74d382d0f557ecea4e42b7d50dbce43915bfc0c114c16e532aa51
SHA51214db25eba8a863d390b97fce4315402ed7c249598ff6c31d5a191b0f71c274eead42ba0658403e744110de072e6ff1cac3bccee1e48875bde6b1fe39a60d2407
-
Filesize
1KB
MD58fd9a4278d385427b275be97d213f702
SHA1e20c02a0405cdbbf2a2a2858d386b44f50cedafc
SHA25645844d5e5ad868bb7b8b208b43e26ee0ea58dca8d9e1a74f2b3c8e77e1897052
SHA51257db8e70cbe0373a424394a4a83c69ceff4915bcd0a511445592db1c38d375e52ce6d3810c50ca0dd3c87a2f9f1a6538587dbc1a730bd4a1d4a16f704d578868
-
Filesize
1KB
MD531de1300fe44f83c7c30784b765cac46
SHA18875e6e5d7d643550dda936b60c66692278ec63f
SHA25647e77e59a5f3da778f1506e164254c678f221d1a961c2fdc43b6598f1b96de67
SHA51253b7617593aa32df59c59c05447381adf05665d64a0ecdf42b1a804d08efc5b66cd9967efb02c42ec084565472d96611a0b0e8e56dc3a6bd27ff20559da785a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD57f9dd9316c10a1749c040119e93dad17
SHA1141f2d9ac1fe1f704a709385ac36d7f4b31284c7
SHA256ed05aeb9a67cea564a1de9123a918258bc3f252540156de1ca14aa371681f0ab
SHA512a033f612013cd59ca0bf661cea6facda6203963c951e5d31447c889dd40c49a5c0f3f000b9c60308018b03bb82e7a126a990183926dd0d2bc708e903612ce2c0