Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
199s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 05:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.wizable.com/
Resource
win10v2004-20230915-en
General
-
Target
http://www.wizable.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 468 msedge.exe 468 msedge.exe 3140 identity_helper.exe 3140 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 2412 468 msedge.exe 84 PID 468 wrote to memory of 2412 468 msedge.exe 84 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 2000 468 msedge.exe 87 PID 468 wrote to memory of 1940 468 msedge.exe 88 PID 468 wrote to memory of 1940 468 msedge.exe 88 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89 PID 468 wrote to memory of 1884 468 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.wizable.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0x100,0x104,0xfc,0x108,0x7ffa903546f8,0x7ffa90354708,0x7ffa903547182⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,11587579293960032786,12472191995257349757,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5768 /prefetch:22⤵PID:1020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9dbef3f8b1f616429f605c1ebca2f0
SHA1ffba76f0836c024828d4ff1982cc4240c41a8f16
SHA2563e0297327872058355ac041a5e0fc83ed017faee0f6c0105b44bb3e5399a93a1
SHA5124eedc387fe304f27f9d52ff5d71461c7f22147f7a8c18b8e7982acb76515528a36486a567451daafe093f9563b133c6799f2ad046e04256ccb46c83eb99e86c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5941f25ef2882c591e1c7f237e1381697
SHA19dc888b5bd6ef71a96d3163377a1586f09532a76
SHA2568ec13ea10a64b06c34e8e8df0ecc15f468f343e90ed12716fe26946bd9f34310
SHA512bb90d17ac23a2128ca93a52dd46a0fd12a4667f9e7ac0d1103bc62ef5d9fe8180e6bf94b61d530fc7ae9d070a8eff91263428a03b6c2834847eb4e13837cd638
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
387B
MD5434ea58d50a88544f031cbdc85a5aedf
SHA1f8baf4ecda2bebf36215ff2882b5c69deddefff9
SHA256d0dccc82ce536f0e9514a265cc7ef8e21cab494e78d2ed6a401cb60e7c2f3cbc
SHA512eb641def6e61e2e66f272a553a69dae511aa27b69bf9b8581d67d59b706e63c8b78dff9494bb27089a3c17414885bc5548ad456715fccf94b670a2e4b3c99563
-
Filesize
5KB
MD57c77e3fab6fda4ab4779d549bbd3b8ba
SHA126fd872b74a869f256b07b0a3ae7db171cd7d0cb
SHA256cafdbedc95e79588d1f04c3b88c2c667fcd8df5212fe57cd7c8c4b66ba78fc90
SHA512d2a5f348c240240632d12cb5dd9fbd739631bb7e5a9cec1e279fa3d4c666432d069c929e69650873c6905172f0b4e91c547a501cc9bc26bae8257e4cd032e820
-
Filesize
5KB
MD5ac671fd802c85e73b64e410c835a4bbf
SHA187ba1e00d5dc00abed49aedfcd686ac3571330f5
SHA256d33fb1d0f6865e96d75f332e5b9065d70141542a02ce97b9d92cb4eaa813f9f7
SHA5123fa7b3a5a816c28fdc2e95680b484ba3a83588957377699bbe3cf125935eaf875fcb6a3a04913b03495abf1330d67331c12d3e824b61fcfb03c83ff32d268ccd
-
Filesize
5KB
MD5938fe536fbcb8e7499d582b42c72cc1d
SHA15e5e720c16297cae9c5595dabb36c4656acce58e
SHA2564f46a86ad30aee2e1a8bbb1dbb84ed129a763b43a31972cc333be1e008ddeb81
SHA5124e2fae31c299953d44018f7e80a75388f8ec7549ad6d12f4568cc6b9d5fbbe3f698a0124eb36f21720c79c9275cd5498a3d7ef670a4323bd66dd5ebf9b76ae5a
-
Filesize
24KB
MD56dcb90ba1ba8e06c1d4f27ec78f6911a
SHA171e7834c7952aeb9f1aa6eb88e1959a1ae4985d9
SHA25630d89e5026668c5a58bef231930a8bfb27ca099b24399a2615b210210d418416
SHA512dc31807eaeb5221ac60d598035ca3ccab1dbeecc95caaff5e1f5a2a89ba1c83ef0a708ee0b8ed05b588ea5d50e360032a534356f84c89d3791df91d419daeff9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD504daab13c129fcf0b4447933ffea98a1
SHA1eb7b5fd375880f9d24334e909325781dbb151e5b
SHA25638d8a80b6ca6bac6499860a0347a5a9a8571fc4ea0253ef3f15a28e5206b2c65
SHA512fc1105b3b2397ae9a42c950dfd4c58ec03c2dc418e50b521e212a2b51e334331f1be35747ab3a4583b3092944223782cc614f159a61c8a818921f39898c9a41b
-
Filesize
4KB
MD54f34fc57c4fcc053c265f58ae779a41c
SHA147e0f5ae08ac3aea8a1f9dbea0379b445db27004
SHA256fd902603fbb3dc5f1c43caadfe4f3e9b0f8f4c8a5b93ebe2c52a86feb814049f
SHA5127ae89c638eac4a00d350d8c1ff3a1fc06ded0f3a76e55bbbfd3be84842e2a1290446ecb663b7997c1e12d8e2add15d52aedea6d0c892a24fa99df26cffee0906