Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 02:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ra-5653-mo.container.rush-analytics-test.com/
Resource
win10v2004-20230831-en
General
-
Target
https://ra-5653-mo.container.rush-analytics-test.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1872 msedge.exe 1872 msedge.exe 1700 msedge.exe 1700 msedge.exe 3592 identity_helper.exe 3592 identity_helper.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3244 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3244 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 3320 1700 msedge.exe 26 PID 1700 wrote to memory of 3320 1700 msedge.exe 26 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 212 1700 msedge.exe 81 PID 1700 wrote to memory of 1872 1700 msedge.exe 82 PID 1700 wrote to memory of 1872 1700 msedge.exe 82 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83 PID 1700 wrote to memory of 1452 1700 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ra-5653-mo.container.rush-analytics-test.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd549f46f8,0x7ffd549f4708,0x7ffd549f47182⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3068 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,579042458482114611,12315927630946211482,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d8294073f3582e3c0a607a60b6d6ca48
SHA13ee881f415563afd0c8265f37eb78235aae909bd
SHA25631900aacca28ff914c07a077cb9a39ec437ee059958564d718d04ae47426e286
SHA5128c256228dadfa577cdf938d25ac082a232f1e756cedd587f8e1855c0ff7c09571ebffc8221016ccfdfe0b17d356239685eadd72eaa7c32fe46fcfcdf4aa6cb07
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD579661e90eb0e64252fe6a8ab1964a746
SHA10f870d1af8d0f271c7c8b33c27903defd183cf06
SHA25642d87dc38280c4ce49e84b62a9441e5ab186df2c4c2f77b6d2ae1cd86384c1e6
SHA51287388745191efa6862b24fe4b6e12b73ed914ce2be95c7af8e14af88934ae965f7b718c2581702f83112b33ce84028de74f0774810500c95208f16d9449789c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5907ed6074c8afc3fc2ea03b07d30a072
SHA1d5012ce6c62570bd65a707e78daba2e31192e0ba
SHA256a0a0b6af732e0b96cbe23e4fbfd1701cd03faee97c20de796e1f25c40c4e2407
SHA512d8d9d03167e284f98a082eba78614f162825daef9d2fe01c2b94fb67470b07808fcb1a9a1688c571f3a80c60d0cf6dae143398d6076e08c6d92d08b93de5e484
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
723B
MD5215cef76b2f61da8f0a67e03b63326e5
SHA137c25bc59b22172cd74fb532cca2e498ff83f581
SHA256cd8c76ee19ecca2b7a8acca5a48d0327d4345ff94594323a9fcf9055e214f634
SHA512ded50332d3e5692311eb8463963d9a92d3e18ad62eca276d369c4ba9e9f942f4bbc2ab712b34e292c834e2eb1c0ea72505e28ccf7ae7883ea8ccb17b2e1a4bce
-
Filesize
5KB
MD5fb85995ab9fa5a2c60beb9fc5c251a03
SHA14dddcf4d2b338f6a1cf61e889bd3f9c6837d4e80
SHA2565cb96d0dfd08937939f9bb23878e2ba72b5d8e45b5c9fa30846ff53622b52d8e
SHA512761bd0cd495389ae94329899e30e81dc81f47eb026747304e77505ec6fae3066094ae8cc858061401ed55d4e396e810c4d95c0d22855569d9ce4ba3c13992a5b
-
Filesize
5KB
MD56cde8a2f6cb34f5a2289363c7e6ec18c
SHA1a589cde9d6d920d473e878703b32d3e090c8da17
SHA256c73137e30a6d246ccacd361337cd937337667b3881d5b644ec8de7e4e0a52976
SHA51274bb6682cafc6b6ebeea70c07970653e1f57d296f232d78eb688bcaef3620f630c7f0442a81302ee9036cd61550d1efec8ee979a76a9eea283943b49873bad10
-
Filesize
24KB
MD55911f98dae6d97c4bf9724fa3ad0898e
SHA1b050119cb81c1d6278bf35e9e2950a3dd18ba7aa
SHA256c98200c0450dfff44b0d847df78630895b4436320739f9ef01b3a3fe6e9fc198
SHA51260960c1394c1a28f52d4087299fc663b741a139a0a4182e5ca805322de662d89171787793b0fe906aae913d7457ccdb6559eda8ad9c6126a704985b63240e1e2
-
Filesize
538B
MD5ad35bd5ffdf7bf37c29479691c481eb8
SHA1ce722110158f4761c4c629574298665e3bd1ed8c
SHA25686e0965ab500cbe6cd47ea55a5275cc787601c486a987fb1585c5a8c0f4d0f18
SHA512d7804da3df7e61fcbb89017a325bdc024e64bd67750c03eb193655265c252d3b698e9eb88f6c623dbf11008342d71dc560b1e130d4254deacd15ca7a347cf767
-
Filesize
538B
MD5ed6f2ec9143dabcf5862297541cac66d
SHA17740611613c8e03fa9fc7c44eac3c16a8c976e0f
SHA2567f6c749c6ab3f6b452c5d38a048bde9a7134f056f836c21c042c5bcb834fac70
SHA512eb0a6a9606020ea6c02d2c7d3d1a1bed8173f228a0aafff4bc0a6f015580ffbb9e3cb411305ce839e72bcbf1c8edbb24cc84cb9a04d772ee8de16734edab3eb3
-
Filesize
538B
MD5319b0ed3a55d430fd62dc114b8921503
SHA1974e267fe8eb4094a845f19d6c864acbd4d097d0
SHA256d6534449cce7aa81c774ebebbecda9be4affefa9e8d9022711c61a28f0aa8a05
SHA5126cc3e84565d56649014aa7f32aab15bd4fb6c590c81a942ebb9585ac209041485326188d9c45b803371ce458f8484b9461612ea4f151a2125cdddf3801f762d1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c686d66c4afc6b2559c7d7b84ddafabe
SHA180831471d84652b2deddfa8d447da3831ea3d9a8
SHA25639e6260db3721f2f43a89b39a23565e4e08a71c3178f94faccb5c382c5bd08c0
SHA51282ca41caff468fe4f08a2799a276e8eaef83253a04c64e9655735391e891be381d608906441c8071a944a31c47b4ba81027434a3ce861fed0bafca080aee1a8a