Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
375s -
max time network
373s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 15:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://colaschimaltenango.igssgt.org/CHIMALTENANGO_GOTURN/
Resource
win10v2004-20230915-en
General
-
Target
https://colaschimaltenango.igssgt.org/CHIMALTENANGO_GOTURN/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5548 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 664 msedge.exe 664 msedge.exe 412 msedge.exe 412 msedge.exe 504 identity_helper.exe 504 identity_helper.exe 6092 msedge.exe 6092 msedge.exe 6092 msedge.exe 6092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 664 wrote to memory of 2520 664 msedge.exe 83 PID 664 wrote to memory of 2520 664 msedge.exe 83 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 2416 664 msedge.exe 85 PID 664 wrote to memory of 412 664 msedge.exe 84 PID 664 wrote to memory of 412 664 msedge.exe 84 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86 PID 664 wrote to memory of 704 664 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://colaschimaltenango.igssgt.org/CHIMALTENANGO_GOTURN/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff791246f8,0x7fff79124708,0x7fff791247182⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4384 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9089557201695000420,5870972285475623793,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:468
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:5240
-
C:\Windows\system32\PING.EXEping colaschimaltenango.igssgt.org2⤵
- Runs ping.exe
PID:5548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d0c641c7030a1394c11f0176af64284e
SHA10518a151863faf26d9562d2b4233dc9b9c2b1784
SHA256db5917dc9e21232732f7f18c578b81a185bb54f7ade2cae384789facd8882082
SHA5125d4b30f65cc0d37e318e4ca8ca67eb88f97b82fb6454081d4f4fd2f41e2ed7e98c77201c5e85eb735a333e67d7cb05a89dc24673cd4cc9efa9d1c1e6f277a58f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
574B
MD54fe860518f0e1649d124c9bc4674d589
SHA1086b1d1482d5f21cbd86347464951097c9272a0d
SHA256f0a98b078aacdefb147470441afcd74b5c844c930d9e820a73387669440bdffc
SHA5127beb8b847801dbf080349fde78ecd4f21cf99b70740d30ddb7a14cee2e23c18b691d9382eeca6cadb880bccdefc44e8210f69d8cd9731d4b589c9aad470d5613
-
Filesize
5KB
MD5af64a58115b3083b139ca0ad9e644326
SHA192e673834eb0a54d6c18ebcfafa295eec8804b74
SHA2561abd5cf6de4e397c353f91c9f8b81b8d875a3cf71530001ffda32033737ada3c
SHA5121447f27b6d5cf70778b3b71cf2e3d20d1dc8404c1187ee3964b9d1c12b7937e35d12593c31c2e3be6279c2815dcee61f10a336133dba2604f97df4ed3c8da444
-
Filesize
5KB
MD57e9eb4bc0d0c654805d6b696cffa6bb8
SHA1498e886a47798c5582d90b42f53d0322cdb19dd4
SHA25653bbc45cc9a1a5c41dcaee10014eb2868b27846395a2036c8fce7d3cccff51a7
SHA51274ececd48ef960659f7811f90b5c47a678e469455999a1d41b5b41f9981db5e8da317b8e2bebbe8422e4bd2da0b5410cab642efcb514a2e34876275c3ab94425
-
Filesize
24KB
MD5d555d038867542dfb2fb0575a0d3174e
SHA11a5868d6df0b5de26cf3fc7310b628ce0a3726f0
SHA256044cac379dddf0c21b8e7ee4079d21c67e28795d14e678dbf3e35900f25a1e2e
SHA512d8220966fe6c3ae4499bc95ab3aead087a3dd915853320648849d2fc123a4acd157b7dba64af0108802522575a822651ecc005523c731423d9131ee679c2712f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c3d61a04-351b-4c14-a240-1c8dfc174968.tmp
Filesize5KB
MD5c49d675b85f23e4509f66238b072e714
SHA1e641f69cf7dc7381b0bd7762fa5728610f64057b
SHA256ee2a56635534fa72676433455946f1a76d12d73fd1d45c43aba771f8dd351097
SHA512b4374e8990ab89943cc7eac003067503f15f085db59b763a58ea99129c16dd76fca5e49cfd312e972fb4b3265f3e4c037d5178d4589b2821fb84fcc7c4cb6760
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a7d691ebfe755e010c282b28253c6021
SHA16e1cd011d572c3312fb320cafca8a8e92ac65095
SHA2567300735a1a12d21b451c7d1c3f8f880124aaf31ffcfad937c9129a517f84e120
SHA51275d00394a4956a70e75b1c7783aaee82b5235740b141337df89be08402bab0cd934ec829a087400da6d8c1e8ca9ce6feb9356c1eccbf2e7c42b924cd59b421bd
-
Filesize
11KB
MD55a773f4b1d45f4e91f565194cec782d4
SHA1d826f09ab1c26ce2601f6ec969c946ae3aeb5b19
SHA2568cd215d4602776b6a22d851a1a9f36188d8c6f064904536dbf2cb4629256545a
SHA5120588662ce3e558cfa864c5e535f016ab6858699bb65b756eeda3b1b2a283aa47763f03d0c7681c1b263d320fefc90b1c5d2c711eb8e4fb399d689e84bdad2f63