Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2023, 10:14
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://autenticator.us-iad-1.linodeobjects.com/2FA.html#c2NvdHQudHVkb3JAY29ycm9oZWFsdGguY29t
Resource
win10v2004-20230915-en
General
-
Target
https://autenticator.us-iad-1.linodeobjects.com/2FA.html#c2NvdHQudHVkb3JAY29ycm9oZWFsdGguY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 392 msedge.exe 392 msedge.exe 4532 identity_helper.exe 4532 identity_helper.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 3288 392 msedge.exe 35 PID 392 wrote to memory of 3288 392 msedge.exe 35 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 3576 392 msedge.exe 86 PID 392 wrote to memory of 4160 392 msedge.exe 85 PID 392 wrote to memory of 4160 392 msedge.exe 85 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87 PID 392 wrote to memory of 876 392 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://autenticator.us-iad-1.linodeobjects.com/2FA.html#c2NvdHQudHVkb3JAY29ycm9oZWFsdGguY29t1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbed4246f8,0x7ffbed424708,0x7ffbed4247182⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3525983024778045589,3918704213813303960,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52573a46c4c5af3422f0e8821f9e537ab
SHA1f383298950486d1b9519bd8c0526b7e2dd586271
SHA25611444d342adf0165850dea1e0e93bcf8ad00cbe6e17cb4b4b89811054ddb95de
SHA512e93547ef8dc4bda1528fc628fe7efbd1adfde0b30ccbc28dc424ecc816b55a3ecf4e8998e4bf481184acc22018a624c4514d0b6a128cceb22e914c0bf8f6b550
-
Filesize
254B
MD5401cc64bbd9ff374c81d784e5b721dba
SHA127486d96c7bbd0d3fcf8f3a2a39f9de769588e7f
SHA2567b938c2c33ddad249128ef63d4c5e98aae3a0122254fce08a44fcf35b36d93ed
SHA512f8a0de3fdc163679d823d03c99a2150c85ac6e6326fedf1ba92b62fac6abaca7c0204ceb8a28151aad2a7fb0c8b4d0cca2714f5cd6d7afd0f6175bbfd2545b46
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD59f08ae8b626866ee55d04c28e1ec1841
SHA16988f4cac39a2dab144316f15e9b3b13ecb2998b
SHA2567afbf43948975df7e74a131782d7cb0573affd0ece8a215ab33eb9163363a155
SHA51229230ea98a6881720986a48d7131268b666ae9df392fcb50202c39c5b5f99bab614ee0deb3ddfce34dd084329dbfbe1aaa33194ba61772de335c2ac361a617e0
-
Filesize
6KB
MD5e7428a48cb80392c57e2c8faf8068295
SHA18044ddb0f46f41bbb027d3ebf73c94ca006456bd
SHA256c91b9c17b80ae0525ef9816792dcf5d369a5ae97648282f1a3377c61483a69bb
SHA512868eebf997d9ec6ca5820190dafa447b2d173a2be0cd437fdd3ada5b115cd3c3643dfaec5bcad745b0bdbd548d276bbeeb3158ee02673194ceaf9a0c8f0e0158
-
Filesize
5KB
MD53ab956c234ed2c41a9e3bf1a108467c7
SHA1e415c2238374eb5f1573a9ca1aeb8d142a78afe4
SHA2565d5a50f84d8c73cc5b7a66973720f190df92378028a50457f95290895fe037a8
SHA512bdc600bfef10de6cb69d21f751154e0981565f15e3bb7b738f92037b607de0f56e4dae8a6f9c3501398624958a737ef11ac2efa926396d745e88a7a52057c256
-
Filesize
24KB
MD5699e3636ed7444d9b47772e4446ccfc1
SHA1db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA2569205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a076c1bc4c3f6b97bffab6de78d2933f
SHA169abc4526e3f3018c34e264ce7cd21be5b986e49
SHA256da8fe9dcb9cd4d0c79e163dbd7490acc971ba55ac2081214e878b2f98534276f
SHA51231664ab636c2140b745c9c9041ee1204ac1b71f031897f9d3e511757f3583b47ca05c112c4ca8ca832d37763b1884013973bd3d82bf078579c29b077556c93a2
-
Filesize
10KB
MD56fe9ecc3a891db7d35fef3c99eef3d88
SHA1e54dd0549ffda2d97be41c7c9112a2d47da1be6c
SHA256f7b02c0f1e09a05658bf9fcf2a731c048663fedb7c8b4b9bc09e1f610e446802
SHA5121419e3b6f55356ff2171d286b96505b298f18b4284fff0b66d6eca01796ff7a4fc5e614e30d1b0687500aa1f83bc817670d767bc5bb8c266d5470c3cdf55fc54