Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 05:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dashboard.hostalloscastanos.com/ato/
Resource
win10v2004-20231020-en
General
-
Target
https://dashboard.hostalloscastanos.com/ato/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 3940 msedge.exe 3940 msedge.exe 2416 identity_helper.exe 2416 identity_helper.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 1204 3940 msedge.exe 84 PID 3940 wrote to memory of 1204 3940 msedge.exe 84 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1568 3940 msedge.exe 86 PID 3940 wrote to memory of 1196 3940 msedge.exe 87 PID 3940 wrote to memory of 1196 3940 msedge.exe 87 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88 PID 3940 wrote to memory of 1564 3940 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dashboard.hostalloscastanos.com/ato/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd22c946f8,0x7ffd22c94708,0x7ffd22c947182⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,4625448134693464896,15385646808708004173,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c0168efbb077a0ae9c70928eb9abdb50
SHA1c25014d65c561a440dd67b427108e2f8a3871d1b
SHA256bd74a055a523af5002e53ad2b978d86eff5253c6086d2523e4254ac28c7a9155
SHA512c37cf313d6b4e3f1edef7f42a36a7774e1417bc50d66da988ff095420e41a264758de3c42dce750fa5f32cf9aa261701aa8ba27ca95362b905807efda4449968
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD554bbd0c075268040c0625827ac27b6b0
SHA16011a3dad3167e7f24710b34c6f257ca60a1401d
SHA256304a2ffe24f9ef4957f3e2846f12011f9781e2ffd03027354c7aa176f51bd758
SHA512b590c83b7487d256bfada3ffd6bf351ecbd127d6d8c20ac93484ce8e9f69ecdbc923c0b1a8420cdc1a2343a05bdc4f30d56dbd73b5fb78b8a887b02d01d763c8
-
Filesize
967B
MD5c2f400c7dc5ecc50a1aef63eef9704a4
SHA13f8309d0022925c128d814d7a5aab6beb85a50a0
SHA256f690d95be616e411a9bb9a035b9a8f7fc29cbd60357fe345410886089d9db24f
SHA5127bd17b01ae6b5cb9598e8575f6008107e7d4455688544803cd5112e5694e670040b6a0b54f01ed23be9b52e78a11d4a3960e5dc9d3bcf4057bf5bc25ac669b10
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD55d9752ac5e4a7d8fed4c84caf905b3a2
SHA10ad2addc6d71533ea3379abe93a7e0da62c7274a
SHA256be420369a387f9b747431a3996ec63c0d8cafc558052f76ef50dec799ad1c468
SHA51275bee2a1ad013bb4c035a2cfb92166f50be399c16d5e586ce50158dfb0c62471f3d74e749b2d322195a4372bf88db42f42f4b2c7cd6d76a0d202bae078cea92c
-
Filesize
5KB
MD528bf2e7bbd0d9163874ed1346b88d89c
SHA13080833ecb01576883eab3a993e4e02b63740abb
SHA2569070e67ccc5f04e077397ee5bdc5a8d51d69c90094c24613219a30252d3a0827
SHA51203e01dd0e7cfbc888cfc6e5669463957911e94d2f4ca187bdbf1e3b8e670b1cb581078b16dbb1a68d1db5b575c93563c14b9f1107997ee06eccc1e3e4a55f434
-
Filesize
24KB
MD58ee4a79ad8d8655cdd4ff2fbf9bdaf04
SHA19089d34724211f099e897847e81bff6da819355a
SHA25680075ae79dc3bd60009645ba34c1e708c55c10d6c2326c8fc3867a59a331310d
SHA512f055f8fad719ddbb3a4735b6fb306b1282fd77e805ef3d314be9da0a42cb43010ede4f3ce177565d8d2a16a1880447002d5de2a4aa3e404834b814b01752f9e7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e7cff8116123d84f061233c76ccefb57
SHA1fb9430e2aa713e7e35bf1540b9d46cda20b37df7
SHA256baa5e4422d5621b5c74feac9154040d01a6723311cde00e3d9e7dc3cffabb579
SHA5126b6890fca2d7d005ca2c1a864b87e58b70d45d71fbc38128ac6dfed8f09fb40e135f3a2f93fda458174de4574403ced4412df7485ace5f28fdbc1fe3a78ddec1