Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/10/2023, 21:21
231006-z7dreaac55 104/10/2023, 06:57
231004-hrd9kahf9x 103/10/2023, 02:22
231003-ct2vrafg31 102/10/2023, 04:37
231002-e8wndsha29 130/09/2023, 02:42
230930-c7c4jshf47 129/09/2023, 02:43
230929-c72f5sgh43 127/09/2023, 01:36
230927-b1pnbsgd52 127/09/2023, 01:36
230927-b1gbyseh2t 126/09/2023, 23:54
230926-3x9ymsfg74 1Analysis
-
max time kernel
411s -
max time network
310s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 21:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dstat.cc
Resource
win10v2004-20230915-en
General
-
Target
https://dstat.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4524 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2576 msedge.exe 2576 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3696 wrote to memory of 1684 3696 msedge.exe 85 PID 3696 wrote to memory of 1684 3696 msedge.exe 85 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 3348 3696 msedge.exe 88 PID 3696 wrote to memory of 2576 3696 msedge.exe 87 PID 3696 wrote to memory of 2576 3696 msedge.exe 87 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89 PID 3696 wrote to memory of 2832 3696 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dstat.cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb91e546f8,0x7ffb91e54708,0x7ffb91e547182⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,14597415533052650541,4786862983375243189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,14597415533052650541,4786862983375243189,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,14597415533052650541,4786862983375243189,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,14597415533052650541,4786862983375243189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,14597415533052650541,4786862983375243189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:3924
-
C:\Windows\system32\PING.EXEping -t 46.166.151.2012⤵
- Runs ping.exe
PID:4524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52a8705049c47446ff874ca03bd4a777b
SHA1100c19ee7ce5b61f02b3fd8da3b47bb6758f5f57
SHA2560408e8c4c694fe438c6206a7afdc591cc7f8dff9d967e5d95153a37c99c09b0f
SHA512b1fb05bc99351eceac16709c68b7dd4533cad16e43605fe770c9c1ca94ca44a98f4772ad03e70006ee967830b2c87af606e41dd0c806685132570da5a63573c2
-
Filesize
480B
MD5e6395b7153e432908208fc37d645a70a
SHA141b19b23aca01b36513ad393fd72b33dd0f77e9c
SHA25678a6ddf8e8a76fa787b04258e530ef8821394e68b5b06ce038eb677ff2fe0e60
SHA5123cad1bdb0e6d1a06696c28f74a7c3ae0bf73df1b1f849ca8b3fea5f26c79969a21618957bfb4b1ee6d0af9cbccc3ed2486acd9d8a95039a0d16e3991f241823a
-
Filesize
6KB
MD5fa7c76717d3774d4ccd27c829833ada9
SHA19218f032cdcdb2f945559c529e6692fe54a4681a
SHA25645182c08d1fcc93c63925a39a57e23a5dfc7ec85ce95c753a8df539a1c3c7a07
SHA512c2aa69af87e9038b75d8b183bb8cf5a80011bc7e6beed9b786923fed5a7a38dae238c242c9845687ba9b4c721080bc6fa2ad96cb79a55352bfff985cab55a367
-
Filesize
5KB
MD560b79de1ad3e54708c4080902d13f5e0
SHA18b7e6703fa4db95cd64da54f2f9d0d39ee140ec6
SHA256512c4aa9de848dd4f2c0dd0b6c4a96d43a260856b2526ddfd2bd4af9b253ff4e
SHA512a6c6d0e4997e83b143285844ef718996c146f45ccf7b86749ada3b47789a5a1f52615212aae285bc70bae486a1dca584f08b95d92b5ed7689119f66071d78357
-
Filesize
24KB
MD511cf6d30ad0e964cedf637c026524de2
SHA1e3ae3ab7de4cbb36493ed67005b6df7381643a3e
SHA2564269a3941d8eea6dac499e044572c16890a70684f5c75eed8f42aaab03ad7525
SHA51287512b02083e09cc77f6d756b7deb818ecbf703d7440e93572333ab6adae53a16f6e1cd20111120904c696effae871a1e9ea9647b026c3fb0c313c0bb354bee9
-
Filesize
10KB
MD571b84277a1814682ccfc394dcad2d478
SHA1ce1355bdd40104668ac04e255755e370e6e75852
SHA2563df9cce648810b1200caedb6a851ec2f49bdc7678d053eb6e3b18f3677f3cc6a
SHA5126da5b6137eb1f8166a04e0c230b08ee5723efe9f74230312167abd9f27e3f27d641fdaf0483fe847d1dd17eebb785dbe481f4d7fccf0336d629c1f527288b364