Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 14:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://moduscybersecurity.com
Resource
win10v2004-20231020-en
General
-
Target
http://moduscybersecurity.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 5100 msedge.exe 5100 msedge.exe 3916 identity_helper.exe 3916 identity_helper.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 792 5100 msedge.exe 45 PID 5100 wrote to memory of 792 5100 msedge.exe 45 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 1156 5100 msedge.exe 87 PID 5100 wrote to memory of 4748 5100 msedge.exe 86 PID 5100 wrote to memory of 4748 5100 msedge.exe 86 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88 PID 5100 wrote to memory of 1848 5100 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://moduscybersecurity.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99ac046f8,0x7ff99ac04708,0x7ff99ac047182⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,8070561333444861184,18403841807763410708,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5a430c023dc31d7289c6191653c225852
SHA16b9484402480cd54baa1a5f625eedf9fd6b5607e
SHA2565635d1bbbc551ca9695e67046519d5404631a816afe4e75863c8905e1236cbdb
SHA5122afbf650ffdf693dcc3c2ebbcb044bff7c4fc74f20a228b66e44449d5ff3df0343e425d0346486ac4d1021d50ce80fda0dd637717664c64a6bed66cc3f6821f0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
690B
MD5aaf278bc0e15f73525807100216a668c
SHA1a4b69dbd46d12639c22f5d0e02c122e2c5dec708
SHA256ee6aa1d672090f99517bd902c3bc735815999d29de71f5d293df300aa12efafe
SHA512398ed017ba4035a37118f71ffefd1fe75afdc41d856cca4892a16a90f7a4394615fb55983f5056af72c24c98363f3b90014a076c29933cf0f21aa0407c036903
-
Filesize
5KB
MD5c9814d7a87fd84eee93b32ddbbf0bfaf
SHA160bf489b2d57b45e4951186cfbd22b20823995d5
SHA256c11c529eebb35c0a6f6b8e421cfd7014821fc6d545073fae16c7e429ef037840
SHA5123c92d8d7c2bf9b5c754a345458d14b492f045f9cae8cc741d739f41f723bd919c5d4419d48a79af73b5a46c6aae9684087ec275721b84942bb0172621a04cac0
-
Filesize
5KB
MD565a1a4fa7a85576cd0bb3320b2d3573b
SHA1e300da2ecded8ccd8550ee8fe565e602a3618822
SHA256e8f80b6b92e74c229c7b91c29e1fb496b71ac45851dea309798f54450c6e1dc9
SHA512afaf69d11fc69b0c6ebce1a03b556b37f480539a1c602580ba6f44d2897867bba3315cbe44ee5a02f48b7ee88cfd4783b3c937b40c521ce8731734cce4af4959
-
Filesize
5KB
MD5899d28a77edf121826cc23cb57c8c159
SHA1a7208f8566e1b58016ba407f61cb7ccedd7d41a2
SHA25635d6bae396a7cbc0492ca4859daace91061afbae391135e122744b6c7d8d940a
SHA5120bb6703640504060e5096ba9894b893985d7fb3c4c0071fe11bb4d918533303d21c47e99b093c3c19e7c68e7fcfd4f76e3afa8af254dba921c309bdf6cec9125
-
Filesize
24KB
MD5fd20981c7184673929dfcab50885629b
SHA114c2437aad662b119689008273844bac535f946c
SHA25628b7a1e7b492fff3e5268a6cd480721f211ceb6f2f999f3698b3b8cbd304bb22
SHA512b99520bbca4d2b39f8bedb59944ad97714a3c9b8a87393719f1cbc40ed63c5834979f49346d31072c4d354c612ab4db9bf7f16e7c15d6802c9ea507d8c46af75
-
Filesize
701B
MD569ab0680c297b359175d68ed95d3e465
SHA173bdd54a900a854c1c24712008b4e338f1c7c519
SHA2564468b1ff2fc382810c297970a360b5c2bafc0580cc57b02c04bd05980490cc79
SHA512779c569f566eb8cc2ffec4ac5da6997c4114eed2ee9698dbeeb04d8e4a2a7d07e1e701e1f2be83d65be7c3a4feb3b6a6c8eeaa20e3e7147a4a0da48b8ad1f046
-
Filesize
701B
MD50309ada5ee269e6b6ddb692f720cf50f
SHA1d713c71763b5505377b73059f5b8e2ea3a85f885
SHA2566989edcd7a04f5ecdabda6092788069e4500e4c99be2a0e225d06c130dc1668c
SHA512991ff3c6ccb60ff44be8230f711707607bbf02b58b643840157cc2e89ddb9c96f70e6c3d0b1c7e04a4b7a77e148f27b1d3d1b0a15f8ada638a887afe97fb06e5
-
Filesize
701B
MD5add73aec80425066539cea9ca3669521
SHA1ce67dfc961b16a18e9f8fc06ad210343fef073a1
SHA25676a558d8c1104bf8b2ac0e2b8f27a1a423b63cfc4d08719df1e846cb131d34d6
SHA512a8494a4f2b43805b4b3e1829b98b5bae236bde0c70791258966d33b899b4617693240655a85503c1a0df8341c1349e8928643fca0ed9013504837bda20df68e7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54343579652873e4ad9077fa14aa39c94
SHA10adf6301d0d0b378baf9b1e10a40d4d961baeb02
SHA256580b6cf90fd89a98221e1e71fbf2df4c288df8cf17707a709f5fb38992639fff
SHA5122b5d785cc4ea2b7ddfd35bd1a21f325fef4cc500dbf3bb38bf701b7508aea3ffb923a6221b21e47174d5d13f07811cd334a29b924ef55fc8f9ae494fad5fcfd3