Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-es -
resource tags
arch:x64arch:x86image:win10v2004-20230831-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
02/09/2023, 15:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://linkvertise.com/157244/gdhm-v356/1
Resource
win10v2004-20230831-es
General
-
Target
https://linkvertise.com/157244/gdhm-v356/1
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 72 api.ipify.org 76 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 4832 msedge.exe 4832 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 2556 4832 msedge.exe 84 PID 4832 wrote to memory of 2556 4832 msedge.exe 84 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2624 4832 msedge.exe 86 PID 4832 wrote to memory of 2592 4832 msedge.exe 87 PID 4832 wrote to memory of 2592 4832 msedge.exe 87 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88 PID 4832 wrote to memory of 2816 4832 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://linkvertise.com/157244/gdhm-v356/11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fa0446f8,0x7ff9fa044708,0x7ff9fa0447182⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3567722392689152529,4280802276102571051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,3567722392689152529,4280802276102571051,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2552 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,3567722392689152529,4280802276102571051,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3567722392689152529,4280802276102571051,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3567722392689152529,4280802276102571051,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3567722392689152529,4280802276102571051,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3567722392689152529,4280802276102571051,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3567722392689152529,4280802276102571051,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3567722392689152529,4280802276102571051,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54aab618ef3d86f2fbf808c4ac50ab083
SHA13f794d5499a16d7048809b46589984a065164ed0
SHA2564971c4c535809b9ffe1b1d9b22e7d9ade38d51a4406def14c54708a87c2e4dc2
SHA51221adbdb317cb85cbcb370003a09fa6f75fd8ba65b4453d33f6f3abd6449c9c0ce97a9480fd5c058885a264364b2c00e7979a7bd285b76b296c56f85e207babeb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\79a5a77a-1bcc-4fa7-af18-3ab66eb2e110.tmp
Filesize5KB
MD5c7bece95ee78e3f566b99e77e716cc4e
SHA133505fde79bf35a609c9c17ebcbf7b6d1cad7df9
SHA256412459ac6e981c75e7607f34bf32e09536646666d1fa0d17a5ce236826709203
SHA51298c145b3d670f781409f39899924f507ffbf8ac9653cc4e69aed14f4aaf2604652bea2b036335d2153fecd6a27295d90c41a86fc61b47f12f5f506b956ac1fd6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD50527b30b45784c193ea444d16545cb2b
SHA115159ed8c1be9cf05cb8ffffc5e42cc33b3e43e4
SHA25630714a53d76a5073d6d3fddad23b05d3292f7e0c24f45957b4054fbeed6c7cc5
SHA5124a7f92c66fe7d291aa738e54749552aa4744fa7548d00507e1d324d60cd677a78e30b0cf12a7197e061ad07e555eee4525a517fed78c0eb00e4a304d73e11cd6
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD5db8dd945986b29d48d55e95ece394aa8
SHA1a900f8f16abf260639a6dcea3e00c25fa8ae8455
SHA256be352d985528ac0b30a13100ef326eb3cb9927b2b4d4971d484ad0059773302e
SHA5127f44eea61727cf1aaa4355dbead5fb4d16f1d8f35dcec319cdb5d97a818866aaaf86e0eb3c0bc0707c765795359d9dc7d52d27ec8bb6c3ee3e63c782a8ef1316
-
Filesize
6KB
MD54a01cb0fadc41dbe1bd8136f2158a869
SHA1c4086389b9c19e7cdb7ad05a86b330fee34af067
SHA2562b6f132143e9ac701f03ca98ec2ac115cc0187767d60cb795ad5e565d3915591
SHA51248ec5c96504e6aad26653afe6c39c9f28d6d006873c48fbfb27ee442541f638968d245a49dde78db5f46e7630382075ac77af752fb6b8971a06cfe859ea25170
-
Filesize
6KB
MD53f2c2c9dfd2a707880e4c492a4bb6bb1
SHA13bc81bdc97b88d91f03074835d36a6a9ea63d0c0
SHA256ff9dbbabd951d1bc73b82dc88a0c08e3651b958efa60e0a451d935d5cb745dc1
SHA512ebc9d58a5989b7c393b8bc5ff17445f6d91867a0c1cb9fb3acc698b2b8210f2170f9d04d03e622345d0b36039df73aba32554e15b09b27b20448c6eac54eb818
-
Filesize
6KB
MD54db56d17b8caf3c89b352804c2aee119
SHA16276b4902b6e5e481aeb2fafc155304184a61c78
SHA256b3bfbcc5012896f66777efaefca693f98a05cefbb9fe4b0d92f6a9b72e0f257b
SHA512088c86696fd0a461707a5c690e9a1d30df1ffaeaf87674ffcbb6ea73247ad63d5ef7b6cea11f0ddaa7255e6214d1b5674d1e64097b2a5f7726701c1205b8bea6
-
Filesize
6KB
MD5a9ab4c1a477f5ab4c94c6d3f5d0b0e69
SHA18462bffb6a9189f079fae1fb5732936281703ce6
SHA256130570116a4bb3f7385b85cc5a49a8ca41c9ed12bb72ddeb419fc7c2e064742e
SHA5128a0ad712ef62c3f0795c96d4f8ce1780f0eb00a2481fc6e256938bbdd1b79e09507f258d760e391f079da8a510d5cb8055b2926c9c229528ae70f0376658b0ac
-
Filesize
2KB
MD5cca43b3ca8edba7eda1c693e811b884e
SHA1ce326f5dae106cff9d6cf3ca88eef668fe2cb5f9
SHA256e6feb398ec69935cca98ef5da6d9b94293e4e2102c22ef5b5d9a7909ce44582c
SHA512d10884791855c27616a476edaae9787a6ede7d8cd3f299898613cd0c1829cfdebf74ddfb3eefb9fbee87a557babcdb34991dbb846754ee0e862055dc3a583703
-
Filesize
1KB
MD5039da3dda15868d5bfecf2fa3cd978a8
SHA1c99f236994a9ee92b33b400c0650d6a0270a0d3c
SHA256554d4c67f47d73f291d36ad93fc0d238e3834a3b723b288014cec378683bcced
SHA5126e8b76983aee799bd0e06e5c5eff50f92c52248a61d3b5ebbcf7045548a86746b98c8200ff77281f6596e768eb4816a4a8caf4952606b3de39e78a9fdece8d50
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f101952c-ddf8-48fb-bb67-c6b7707c4f88.tmp
Filesize24KB
MD57caf65193db27a3b881dfb25b62ce529
SHA1304e35e18f36b79acae60f4a426f0ab861a651b5
SHA256eaa4cdd8c166fc998235daec7bdc3fc2a9ef1e2207be2f4eabb8fbb564ead890
SHA51296231ea6ea8f879e0d2f48fd7bca3480ef78df283d135a1f631faf701215c4d9477b1a8eb59a24b8f08d060b71e250e04deaf49ea08758993b77199a6bc5cd69
-
Filesize
10KB
MD5fe131648ec07b8648b1efa225ba6fe65
SHA1ad660417c3ca5fd30c362b76108d7c163c5ff35f
SHA256814f5cfe53d461af746791d70fcd73e1e65a70aeec91a7c3778dc141db089721
SHA512f7bcccbb442d700cf68071407d23283b89c2effc73da0218b7ae4307a8ba88e84e503197c931f1c0455a92de47335bc992373b51554e96a15741611cd9986c21
-
Filesize
10KB
MD50f132c3ec707f0b6f0732e334b8f8447
SHA1a095be7e6dc8d3fb2ca9f8279af8becee658bef5
SHA256987253ff0c352a4212d331b27d9753ee760a8388497ee10c283aaa0e3b29a697
SHA512ef91d196a119b5eed4942ca3e2122232f9fb710d315e5eedbc319fdef685fb23fb05ee76bc5ca245379eae95be77b1ad7b3d26e7abd3c6a94bb88875767cfaea