Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 03:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://192.168.22.107/acc_MOG#/login
Resource
win10v2004-20230915-en
General
-
Target
https://192.168.22.107/acc_MOG#/login
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 4756 msedge.exe 4756 msedge.exe 1548 identity_helper.exe 1548 identity_helper.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4756 wrote to memory of 4024 4756 msedge.exe 66 PID 4756 wrote to memory of 4024 4756 msedge.exe 66 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1468 4756 msedge.exe 87 PID 4756 wrote to memory of 1352 4756 msedge.exe 86 PID 4756 wrote to memory of 1352 4756 msedge.exe 86 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88 PID 4756 wrote to memory of 4428 4756 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://192.168.22.107/acc_MOG#/login1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94f5446f8,0x7ff94f544708,0x7ff94f5447182⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,4054796424216966870,17358695306026394789,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5044b7ae38b09e9479d24cc13d7ac5c02
SHA1bd24e6a8c873dfe198d3b02061a6ce1a3beec420
SHA2565e3f36821370020f3396b30441f3eddbde34d690918b79c51f9a804b5991010e
SHA5127e9342083315ed163d8af0a6386ea634002e2a7d8032dcc5345174568791b37bbe3f19f90380608172b7d80b6b8f1fcf2ca4f2fa9e1fa1c71542ccfdbc74a053
-
Filesize
5KB
MD52eaf4fa9b1666e8a583ad4d1779fb2d2
SHA10aceba897299cfa3c7be486c9ad2a5fcc743aaf5
SHA256846f38728470a2e358776599850d54e1727db96dcb3aa3ec5d2445903b9fae0f
SHA512ac1df9d46f67c54a8c8ab30c8b1fc51d008a330a5c977d53380374adff77aa0b771535eceafed0ba601944153d25dd7e495d74f5b0aceca245e37a72d597d5f5
-
Filesize
24KB
MD510f5b64000466c1e6da25fb5a0115924
SHA1cb253bacf2b087c4040eb3c6a192924234f68639
SHA256d818b1cebb2d1e2b269f2e41654702a0df261e63ba2a479f34b75563265ee46b
SHA5128a8d230594d6fade63ecd63ba60985a7ccd1353de8d0a119543985bf182fdbb45f38ccc96441c24f0792ea1c449de69563c38348c2bedb2845522a2f83a149db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a823a827ffdd82a1461db720bdb907d0
SHA1fa3d523b1d095bd2201d8f800387e245eb7b9404
SHA256a85f0cb398b92d5e1d5a83128c09b494cbc0f7ef89606ea5986e5778e6f5f34a
SHA5126d3798905656c93e01a66c793ad26f763eec5bfd929e937ddaf2f71c8ec2000cd962021ba1d029f6efe6b4e563aeabb93d3dca9477cc0dd57f9e9d93e5d3cb64