Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 22:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.brewtops.autos/reducers-superficially/c426UQ2W395S8OI612Cz5eceH173aR25d6brHs6cIsrZfwgIrIvZ8EGsi7pQZR9dR7Puz1L0S5LJw1D
Resource
win10v2004-20230915-en
General
-
Target
http://www.brewtops.autos/reducers-superficially/c426UQ2W395S8OI612Cz5eceH173aR25d6brHs6cIsrZfwgIrIvZ8EGsi7pQZR9dR7Puz1L0S5LJw1D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4440 msedge.exe 4440 msedge.exe 5020 identity_helper.exe 5020 identity_helper.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4144 4440 msedge.exe 86 PID 4440 wrote to memory of 4144 4440 msedge.exe 86 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 3164 4440 msedge.exe 89 PID 4440 wrote to memory of 4316 4440 msedge.exe 88 PID 4440 wrote to memory of 4316 4440 msedge.exe 88 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90 PID 4440 wrote to memory of 3940 4440 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.brewtops.autos/reducers-superficially/c426UQ2W395S8OI612Cz5eceH173aR25d6brHs6cIsrZfwgIrIvZ8EGsi7pQZR9dR7Puz1L0S5LJw1D1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb879d46f8,0x7ffb879d4708,0x7ffb879d47182⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,5192346921089257447,17124035943572710433,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5352 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5efc8fae6a40353eebab597b5ab87486f
SHA1ee25190956fac0752d597ec05af896947620f46f
SHA2563185185de9c67846638c110ca71bcd14206846c438c3fcd9624d025273d99da1
SHA51205b493d97b9fc92bfc47974cb687a79ff7ea7c7721e56bfd873b9290df1bae40044a22aa544f7692be5d1541e66e0eb26725761ceb3517f0435dc1fa3c5898f1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
403B
MD57e75588725d48f6d4dd94dc4373755ce
SHA1c8deccaa02c0f76f27de02eede8062e6fe444dcc
SHA25659346b501d356c16c184ac27c7a1d83a592f4496bc24233977e21dd36b44469c
SHA51282df43f939348975b06149babd83b9fbb01829e372407780ca79547c9299c17c1b4db267ca1ccd0d42d00eb7ed7ad9552174e1b3ba789c44a0ffe6958f7fe716
-
Filesize
5KB
MD516c9c5dbe6aa379ec9ac78586b7730d3
SHA195ead7560f4280948515b49f2c5cc9d8502463ac
SHA2560c279c60de0085fa7dc299b4c35385607ee6d42357d4fead87d7a057c67bc124
SHA512e1653a4e84be88602f68d8e7f56a0b4e0a0a42bf31c731dc46b5e89db348985853bc7a99da9bf028a4a7dc4525d9af6f040b30143df770c91d69b906fb4f88a4
-
Filesize
5KB
MD558bde04d694c4bfcd868d9a5a4eafbfd
SHA1d630c647b1bdc519d8e1da9e2e7d22ec9a61e988
SHA2562caa18db41f7f26c6d2b6ca3c84b9897d6e0eb227ecabd3f2a0d5a74fe2b0946
SHA512fd0fb23c0a20782d41c8528e3703616bd0295d815fdb488ad08e12c6541d2459625de1d18f1ef41cd019a9b91f5833d5cab302738b5e0d4e5ce2e6450022fac3
-
Filesize
24KB
MD510f5b64000466c1e6da25fb5a0115924
SHA1cb253bacf2b087c4040eb3c6a192924234f68639
SHA256d818b1cebb2d1e2b269f2e41654702a0df261e63ba2a479f34b75563265ee46b
SHA5128a8d230594d6fade63ecd63ba60985a7ccd1353de8d0a119543985bf182fdbb45f38ccc96441c24f0792ea1c449de69563c38348c2bedb2845522a2f83a149db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53f90c70a3cacf5d3a981361c1dbb1800
SHA12dbc567e7ec72e1d2095d975739a0faba981558f
SHA256aee76b0ea6fe9ece5f2dc4a17d6894f940e5153bf73fa29774cad124d23c22b1
SHA5124121c80b9a1433e66766b037b793905eede51f7f15299b02d068f8b7f3ca7b748c74c538655dc9d3e34f419e17ea717f41567ca25d2f289bfe4fc131b5854305
-
Filesize
10KB
MD554693530c90e720aa2037c02e0b89122
SHA18da0131fb215bbf01c5e53afc57fec2a135d55c6
SHA256bfa0a18b40b48cb04c554b80a97f728077d2470e3430fce858422347c91c30b5
SHA512c1a5384668f63f73f1cf06ade952488247a33d9b1d16f1cdccd6bea9a3c5edab9188b4004b42491156263e5deea6fc25aa7486a42d3c6343639c6c0ea6ab767d