Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 15:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dignityprojectstudio.com/bnnruralnline/index.html
Resource
win10v2004-20230703-en
General
-
Target
https://dignityprojectstudio.com/bnnruralnline/index.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 32 msedge.exe 32 msedge.exe 4136 identity_helper.exe 4136 identity_helper.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 32 wrote to memory of 2144 32 msedge.exe 82 PID 32 wrote to memory of 2144 32 msedge.exe 82 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 2148 32 msedge.exe 83 PID 32 wrote to memory of 1700 32 msedge.exe 85 PID 32 wrote to memory of 1700 32 msedge.exe 85 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84 PID 32 wrote to memory of 1972 32 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dignityprojectstudio.com/bnnruralnline/index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d5ae46f8,0x7ff8d5ae4708,0x7ff8d5ae47182⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,7849848040520989747,1492616191838275123,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD570e2e6954b953053c0c4f3b6e6ad9330
SHA1cb61ba67b3bffa1d833bb85cc9547669ec46f62f
SHA256f6e770a3b88ad3fda592419b6c00553bdadc50d5fb466ef872271389977f2ab4
SHA512eeacb0e62f68f56285f7605963ca9bb82f542d4e2ccc323266c08c9990cecdebd574e1ab304ae08ea8c6c94c50683180f83562f972e92799ebbcfcd8f503fb5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD53a80b143eaaababf44d54d83e61399ee
SHA1ae955012a5d4ed08ec3591e61480bef697fad78c
SHA256d49c39218d8fe4f186bd3e51fb59219a791c398383c203ac012098683e953db1
SHA512c3184cf80ffd85c1d8679ab95cdcb7c7c712572c13a406bed1799ded4e0075121b15b1527cd530dca97991b7885f67a897eb4f52db49e92e66629c52eab64fd8
-
Filesize
768B
MD56601700c39714e6a07f9929b6306c834
SHA1c665d2a5d9074fd6158b94a9b4a34a8da1f85ec8
SHA2564916fcdbb3bb4ab819995ec08c67f083e0b41d72e5c7b87937f2b1d397a6bd97
SHA512a4ba2c3b04b55767fdfece79d0b487d155f3c0ad8da8a3b3ec8ca4f4ba35b9423e1ac4dc4efc4b228362031f709280686fb6c23c2d14dae2fa5948e9aa89c2df
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5dc4b0f7ac2aad2a5ad43bb8fdb33dbd5
SHA186733ba5a4f8ee3acff2b00d704dc5321865e3b7
SHA2565bda9637e4f36b4fbe336a83f8b7bb34f23610c0e349bd644f320ecdfaf4f7bb
SHA5129f49e50c392e3caf5d7f7245d9bcc6f6343315e2fd0c7e9f4fee99001ba24f82119c968fbc7865616bf1c070cf41cebdb3252a671f4f197f25570a3f7f35bfc1
-
Filesize
5KB
MD517e81e2f2b9dbd8623246d43c8af0080
SHA175122529fbcefc7ced974bdfcdeb08e86f18e30d
SHA25672ee0ee21b3e871a2c295a172593d6772a447304f489bf9dd539f5a85615c456
SHA51255a9bc3b3025b195ecdfa8de583bd23d751fd2cf761c0a7b4ef959d4cc6c632be93521dfb5bfc3401a1286fd17c7a721c99450c9e786ff8399bb2f58a51067bb
-
Filesize
24KB
MD55a478f1e08816969e8214f982850b754
SHA11cf5e7192f3c6e31c7e27b6cb34ebf89036eec0c
SHA256665cf5612c61412c9acc928b1e155c8f11ae83905ce614d9a1a7ad72cc0fd489
SHA5127e7ff60c157841f6f5bb206ebbce29f6df3a6c0c671805415ad7226654e13da49ad76e39a6d0afe28992348f3b5685ecacbfb44178fd61998c54caebbfd97832
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a6222e2fec188c61f5f35aa48f3a576e
SHA18555a70315de19da57bf7606ec034d008d625ec6
SHA256ab458ef8cc7b24b26c208f836c3d17c2d5ffef4c80f0d1437d2361932bc59ce8
SHA5122cb935df58df63a08219d040352e78d85ea1277667e571019e0c1568469b1ed581d0a7e6b3a4e84b833ab8b7be9a51e6256efab87b093d4d44788ae99655d0c7