Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 00:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://teleberta.com/#&&yygpKSi20tc3KbEoLc9MzUxMLyvIz8mxTCszT9RLzTRPzDTP1Ssq1beorDLQBwA=?am9kaWUub2JzdEByZXNvbHV0aW9ubGlmZS5jb20uYXU=
Resource
win10v2004-20230915-en
General
-
Target
https://teleberta.com/#&&yygpKSi20tc3KbEoLc9MzUxMLyvIz8mxTCszT9RLzTRPzDTP1Ssq1beorDLQBwA=?am9kaWUub2JzdEByZXNvbHV0aW9ubGlmZS5jb20uYXU=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1232 wrote to memory of 3240 1232 msedge.exe 41 PID 1232 wrote to memory of 3240 1232 msedge.exe 41 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 744 1232 msedge.exe 87 PID 1232 wrote to memory of 3252 1232 msedge.exe 86 PID 1232 wrote to memory of 3252 1232 msedge.exe 86 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88 PID 1232 wrote to memory of 2156 1232 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://teleberta.com/#&&yygpKSi20tc3KbEoLc9MzUxMLyvIz8mxTCszT9RLzTRPzDTP1Ssq1beorDLQBwA=?am9kaWUub2JzdEByZXNvbHV0aW9ubGlmZS5jb20uYXU=1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeeb7146f8,0x7ffeeb714708,0x7ffeeb7147182⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11682242285982644614,7026585614246819862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11682242285982644614,7026585614246819862,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11682242285982644614,7026585614246819862,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11682242285982644614,7026585614246819862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11682242285982644614,7026585614246819862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11682242285982644614,7026585614246819862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11682242285982644614,7026585614246819862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11682242285982644614,7026585614246819862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11682242285982644614,7026585614246819862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11682242285982644614,7026585614246819862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:2800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f95638730ec51abd55794c140ca826c9
SHA177c415e2599fbdfe16530c2ab533fd6b193e82ef
SHA256106137874d86d602d1f4af7dac605f3470ec7a5d69b644b99d502bb38925bbd3
SHA5120eb01b446d876886066783242381d214a01e2d282729a69b890ae2b6d74d0e1325a6bd4671738ebe3b6ecadc22ceb00f42348bad18d2352896ed3344cc29f78a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\095a9be4-e38d-4aac-8f0a-936cf96bb137.tmp
Filesize1KB
MD535942e3c8638878d7ece0c79950b0d13
SHA12fb65de18974a21d2bb7c07a74a9acbc3b028f13
SHA2569c12931a3bf8c3d2ab702564dad05f90ce3c08ed0be8a5c234e0be6833f5604f
SHA512d83028a6b1dda35887d69c8c0bb43803684360f551305d290d87b22b0587ffa60714e6508db2a016f9e4f4374d0f806091ef58046d139056333c1352da8bc296
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD581000ef732a8fe52147d9b56ccc411d2
SHA1b081f3604aa9d1d47fd0f7fa69e6699cf4975aaa
SHA256cf1fb06108a946963832d800492284e05f8f311c60ca55330a507eb57043b173
SHA5125bd958efd1c8122bf1ebcea0473ee0ae48c8238894d650774c955cab4b8cae309d9f914324851312e1a96b0def51925a15bd128beb0b901a90c7e48d0d019843
-
Filesize
7KB
MD59cef71c52a3a80101d05683201050000
SHA11cd6043bf1875aaba1cd05a2029e0f3c2b3d51e8
SHA2562f321b6cb931384cb1445b16349da3fd8ae376ade31034aff444c977261ed54d
SHA512d73bd4eaa6aff5426957c812e7bc3919f797b280fb41df2f99be450108a2b9c9215cf86edc313eb48ec3d53b446a5bbf21fc98ac66338d0143d01cc99dbdf543
-
Filesize
5KB
MD5d834a0c704c3a713da78d81c990e1d60
SHA127f20b7ab68c0038f72c8ba42651e6e5f164f69e
SHA25628523372afeb4c31e9e8773578fb37fa577cbadbd2b6a1fc05273db8d3dca7da
SHA512c7d757bd6195b9ed333983c1d6b9783f2c4482c5b7884e25944bd9109df3dca69ab7f09c6fb991586427ff90f20f145f88258d55b4de6891a73415b0483aa0eb
-
Filesize
24KB
MD5ac1d0471a91cedf5c34b7e584883dcd6
SHA1755466ee0171ae8bbaef362a50989617c5281514
SHA256456974f18d37871ecf326434d52830d6851f3bbff680c824be83ae99375f9157
SHA5127c92292d32836d3f6d59ea02bef8696082ff4e94d2e3cba7921ae9b5c7d6dfc34d4282d8e96ecff8dd1f22fb45d821b2bf899aa5e6fdfa74b3143a2bdb709cb9
-
Filesize
10KB
MD586986a22ca192a297cf25c43eb61f873
SHA1d1faa07e85104ab8273c8fa398cafe8ff43c22ee
SHA25645258984c640fd3042794ee1abc74053332b03c891a92cb5755ec27de4b4361f
SHA5129d5da75b2245fe26d4a3f20f62a0100a4d672b501301567012196bfe77e5ecbed10d76b45f75ebf976e00f91f27144490817d3b581120789ae955ca2ab0819d4