Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 03:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://auth-atoref.info/
Resource
win10v2004-20230915-en
General
-
Target
https://auth-atoref.info/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 2536 msedge.exe 2536 msedge.exe 3960 identity_helper.exe 3960 identity_helper.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 4032 2536 msedge.exe 82 PID 2536 wrote to memory of 4032 2536 msedge.exe 82 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 5016 2536 msedge.exe 83 PID 2536 wrote to memory of 4948 2536 msedge.exe 84 PID 2536 wrote to memory of 4948 2536 msedge.exe 84 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85 PID 2536 wrote to memory of 916 2536 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://auth-atoref.info/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffde7bd46f8,0x7ffde7bd4708,0x7ffde7bd47182⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2408 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1123609829979326248,11624431702185105469,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD540b1d44aae8bea3d1977aa0c530f03cb
SHA16fc68f8c36d37533638fbfdf695c26f2f43dda47
SHA25653cb039690e79307a572cf80f1ce4656d6cff6c8bc50dfa8c2acbedb6ced99f7
SHA512121ed0b7519276a439da9246f1bdd2628a95781ad130c5656f7c0042b13fa2cbc98baf2e665ff4d845aca95bb2f068f0df92006b0467100e8827438c3c5fe24f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
982B
MD59d47419959730c17a2cf269ef8faaa6b
SHA18b8a798fa5d06fec172e5f25184182e610137810
SHA2569abacc85d5150910f7267c730c348542b9d9aadf808cc134d9b765e7b1a38801
SHA512e958242e4e7d41336ed637cd2fe9f0895c2414df81db0fe79d5b918fda55d5f4f3ce998c708db01151e6835ccc26152337de2dbe888872eaf0703556db9725b0
-
Filesize
5KB
MD5cd72a4eb6a1af17714e5cbbb69bfdaed
SHA1761c869ad0b882a3faac76329eee671f3a504d62
SHA256b57629e61de1b550d2358bce88c268baecaf66850c78ed4580669bb2e57eb385
SHA51284981a644c770d59b6372734169c43f72b3179385ad2417ee4250a1af72813f61c6d223852ca0a8663545cc8d7735114a559cf23189c20ec6789f651ddb6979d
-
Filesize
5KB
MD5d077fede34c9907ea5eee5d4f812d24f
SHA154497a5de7b77760863d219431c8d51f9c32d25f
SHA256cf5c4484c83bb48c92e2a9e4b385d3b0ab907fe7035281a80fb6bcbe3e3dd315
SHA5125b39fe36975314f2b46114fb8852d6050ebd6be0c10295d648dfa3745471130f7b5b3a979076e91c0dd3aecaeac2fd8cd1d009def6d963006d763028fe14f3e6
-
Filesize
24KB
MD5d555d038867542dfb2fb0575a0d3174e
SHA11a5868d6df0b5de26cf3fc7310b628ce0a3726f0
SHA256044cac379dddf0c21b8e7ee4079d21c67e28795d14e678dbf3e35900f25a1e2e
SHA512d8220966fe6c3ae4499bc95ab3aead087a3dd915853320648849d2fc123a4acd157b7dba64af0108802522575a822651ecc005523c731423d9131ee679c2712f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57b478b274de63c9ea547c6db5f1e9fd2
SHA11b38ec3347f31b212606f7f4c52f2515e7aeca28
SHA256f7c74c846d272a74334bc284c2558fd88f43599cd39ef37cec628ebceffa8b93
SHA51208e0cad8105fa7747449e721a9465539b40526a6f58065bfd5bd4fb40b4d44def12d3993fff17478c1e6600508c1815ea123710885811d3da25e6c23fc6891ff