Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/09/2023, 11:31
230922-nm4xbahf32 122/09/2023, 11:04
230922-m59pvahe59 122/09/2023, 10:55
230922-mz7y3aff5x 1Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 11:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://domclickext.xyz
Resource
win10v2004-20230915-en
General
-
Target
http://domclickext.xyz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 1260 msedge.exe 1260 msedge.exe 5080 identity_helper.exe 5080 identity_helper.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe 1260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2900 1260 msedge.exe 24 PID 1260 wrote to memory of 2900 1260 msedge.exe 24 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 792 1260 msedge.exe 88 PID 1260 wrote to memory of 4536 1260 msedge.exe 87 PID 1260 wrote to memory of 4536 1260 msedge.exe 87 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89 PID 1260 wrote to memory of 5000 1260 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://domclickext.xyz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xa8,0x108,0x7ffb4c5446f8,0x7ffb4c544708,0x7ffb4c5447182⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,17046362304404677127,4998046371737033852,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9dbef3f8b1f616429f605c1ebca2f0
SHA1ffba76f0836c024828d4ff1982cc4240c41a8f16
SHA2563e0297327872058355ac041a5e0fc83ed017faee0f6c0105b44bb3e5399a93a1
SHA5124eedc387fe304f27f9d52ff5d71461c7f22147f7a8c18b8e7982acb76515528a36486a567451daafe093f9563b133c6799f2ad046e04256ccb46c83eb99e86c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5f82032415b170f899b583869adc69ddb
SHA1e7d55d4170644d4d67a031802651b6cf904a76bc
SHA2562331c9475e0ad29f60fea316a0098d3d0bea77c2b71aac62de49811ff9b7f202
SHA51206686cc6e92628f0f8e9c8268379f9150b9ec341ebebb6c8ad8cfa79b5174e4ccc9d9c1cb9cf0eb618f6cda46aa42be96777a660663cd8347413a62cd0b50528
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
931B
MD51a30c0f223462cc91acb392508a47f26
SHA140069a1de1efd0601f08801c48fd48dc783fa5d2
SHA2566fe7633a2dc03c8c3a9522ae016e66332b914bb8ed6bb37829928755c6f8f90d
SHA512bbba80dd28902e735fdd1713234a425073179f6f8b074c728269021af589a50cf92d290c87c112a49139846ecdbab5d5ffdcdfdf73f110495fd7dba31ba555e9
-
Filesize
6KB
MD5da393ccf77d57526616b50d48d0376ab
SHA1e269af34e1a9dbfa835a633b0bb6055c061ee9e8
SHA256694b66f308f4d42a3e556d8070089c17b98c69c5ebce900c31400f91598a527f
SHA5129cd5f19db545623dee89857d728f15eecb696dc7b02c24ba9593aab86e0f51d540d5717d7066a8b4ceab63a4a20ee6147fc1da9de65525d5329bb73c5107d0ef
-
Filesize
5KB
MD5b4385ce3f2e85d7e89035786046b6f5b
SHA1ad76afe83403036b40d8d0021c66020b8239103d
SHA2568b0527632065804bb62c4621cd4e28fbcb35ae3bc2e83b011ce58527d11ac403
SHA512b92f6667ebcad697936b651dd5991ad38653927676f8c1124df909caf42fa7264f913c262dd98d8219563b6bca0c5261e78a45ecdf702e0fd39c668eb6b071be
-
Filesize
24KB
MD56dcb90ba1ba8e06c1d4f27ec78f6911a
SHA171e7834c7952aeb9f1aa6eb88e1959a1ae4985d9
SHA25630d89e5026668c5a58bef231930a8bfb27ca099b24399a2615b210210d418416
SHA512dc31807eaeb5221ac60d598035ca3ccab1dbeecc95caaff5e1f5a2a89ba1c83ef0a708ee0b8ed05b588ea5d50e360032a534356f84c89d3791df91d419daeff9
-
Filesize
1KB
MD58a3997779dac139cb9863d7612b28628
SHA187b8fc2b9321262e985147831a3cfbdf81b33b7e
SHA25630c80d2fb85e07839b99f58395a893245d3bf77f989fd1f5009150f2f75dd78b
SHA512032cae34829c28cc77ce9c935aba4352b61ed46d6999f7584c61cf63fc5f519fe9b866434dcc7a0b6c49b13bc45647c37fa46577ecd3672345716654df984af4
-
Filesize
1KB
MD5a62036fe5e26c6b3f71b8acf1bbab628
SHA1ee9a4b259f8a18bcbb8497cbde0a35ca26c09071
SHA25629857314958defcf8afa2fc33ab49ce00f656d6ffd3b6b312a3e878ef307db56
SHA512dcf7b55729b2886769a9bec80298928f64fd3014f2a4d30f86ec5fc683e9665e8de4aa747d8607b02bf4e5325e223f97591a19ed62420eb1b27a3557af9caf18
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5104b0f429844b836d51a26084672fd09
SHA147fa77f6ff83dbd115d740f0e3c3aa80111ffca1
SHA256c4e47fc7a769b51ff4b61f4e687ed61f6df8dfa018c14de155139a91bcd1f981
SHA512794bb02be99831635cc11faa9046f21b289fb0530e254104ed8f37074de2749b9986c624553ee62565bbeadccfb11ef2ad6ff9585d646e49e7c8e0a7dcd7c502