Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 19:44
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.linkedin.com/slink?code=gHH4qzWU&url=facebook.com&sa=D&sntz=1&usg=AOvVaw1RrkcTDMPWdBqZe9a9yMn_#ZG1ldHpnZXJAYWNhY29tcGxpYW5jZWdyb3VwLmNvbQ==
Resource
win10v2004-20230703-en
General
-
Target
https://www.linkedin.com/slink?code=gHH4qzWU&url=facebook.com&sa=D&sntz=1&usg=AOvVaw1RrkcTDMPWdBqZe9a9yMn_#ZG1ldHpnZXJAYWNhY29tcGxpYW5jZWdyb3VwLmNvbQ==
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 2244 identity_helper.exe 2244 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 3736 5064 msedge.exe 84 PID 5064 wrote to memory of 3736 5064 msedge.exe 84 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 3752 5064 msedge.exe 86 PID 5064 wrote to memory of 2028 5064 msedge.exe 85 PID 5064 wrote to memory of 2028 5064 msedge.exe 85 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87 PID 5064 wrote to memory of 3496 5064 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.linkedin.com/slink?code=gHH4qzWU&url=facebook.com&sa=D&sntz=1&usg=AOvVaw1RrkcTDMPWdBqZe9a9yMn_#ZG1ldHpnZXJAYWNhY29tcGxpYW5jZWdyb3VwLmNvbQ==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8be6c46f8,0x7ff8be6c4708,0x7ff8be6c47182⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3692 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,4057962779848879158,5422431137853059758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:3824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4400
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b5f5369274e3bfbc449588bbb57bd383
SHA158bb46d57bd70c1c0bcbad619353cbe185f34c3b
SHA2564190bd2ec2c0c65a2b8b97782cd3ae1d6cead80242f3595f06ebc6648c3e3464
SHA51204a3816af6c5a335cde99d97019a3f68ade65eba70e4667c4d7dd78f78910481549f1dad23a46ccf9efa2e25c6e7a7c78c592b6ace951e1aab106ba06a10fcd6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD537efb06db42222442629b66a5dba9ef7
SHA194c430c3eb8e5a637762117d6810402e2b7204c8
SHA2564b30174e76716a220a4876d7de1673a912e41aac4893a75e835746338c1cc924
SHA512e2ad3c10bbe38432650fb3b235eac56bf5f5f30c3a1a031b66009dc881dda14cd203fe1a9b9316ec5ae255eb21686414ca354bdd664736b7b12967afb8d38d76
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD539cbdb7eb390bb0a8f28c61370ab098c
SHA17a65a36ec2e87abfc98431cf8900156dcf1a9b8c
SHA256dc2b8219961391d2f643ca087ee700a28902e69cc60da05469c30e4ac46a5544
SHA51264dc85ef1035b0a51036da6e1ccf2bff650415fe01d32e1fc8c99a2c74c89e7564f7d34c9e5794521c59e2b0d5c5fd326ee65744d2fd0fb959200e154545a8c4
-
Filesize
6KB
MD59e180f8a3c796ff4cb54c49130ffcd4e
SHA174dfcda9ede0d318578632ace228c1ea12b0b181
SHA2562203d47ffb1af4f51deb3ac8267548556711e22aa4b3898792f701a791e898ab
SHA51266c942465cba3e32d9acfb12304a6de8a43512c49a8cc2eb7bbf2aa5cbeebbdc493f1d5e8a37ba7954748deaaa83b3063cbdc31a6f95e213e22cf47341b21f0f
-
Filesize
5KB
MD5f2075a874e83cbc8edee2bf7ea6c8829
SHA15cc35c4eee7a0435dc41c098373246920044f90c
SHA256bc9cf5537e3a40d92c220501692cba1216229022444f167108f1f8510f77f7df
SHA5123885b616fea4d5fcc4e952ef4a5006138491322b03d90dc225dcaea06200b35ec6728011b297fe5a2fb2f0d223a734caaef55a68217e145fde5b2f315c786cce
-
Filesize
6KB
MD53d8fa36281b73f11824a1c215bc2251b
SHA18f652441b54a465f0d4cbfb0d025e720793fc81b
SHA256526aa69e7e454b540cc4bd258c6808df99d4f231d7658ad9c04556ad49734610
SHA5126a70d88919152a2a581f8f394e65cdaf6c55d7bbd741e922ef77c6eda5a4c81f4c0de2f9af4392b60352e233614db3c63e092951f750da018520077e51606b7e
-
Filesize
24KB
MD529213338df67d29d6454ee5d61ad3970
SHA18c69ca76a2e639060d5ce835a9600e6ea3764a83
SHA256d29fc0d97fa74d382d0f557ecea4e42b7d50dbce43915bfc0c114c16e532aa51
SHA51214db25eba8a863d390b97fce4315402ed7c249598ff6c31d5a191b0f71c274eead42ba0658403e744110de072e6ff1cac3bccee1e48875bde6b1fe39a60d2407
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5c4389741243607a2cdf5183e44a3f209
SHA1863291ebb7ae9a837f9a87fd46d030f42b43bb24
SHA25600dd0f1a95a35199570e0aa19401fc778135e715a1149a1300b9675523dca307
SHA51291218344aad7b0c3f3729f22d1277ef46a6c40385361846109c98d26bb375cf52a69dbb40a7099e9081106ad1f9cf5283804dbd457cc2285427be7a75aec8654
-
Filesize
12KB
MD556ea5348b2e5287363d30dbb5e1f7ed2
SHA19a5b85b57031be10d51232cb737129175619efe8
SHA256eb1b2f273be72d880e17e20e71c1b96339bd9d4e2ab3000d3c5cf8ef7edfd609
SHA51259c58be5bae60e67410db5ebd463aeca3ae080d930993b6538e56e567bb330536171dbc4d56280d48e92f3916a20951b9896b3da3f9affa14e6aca264e00f4c0