Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/10/2023, 05:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://adfoc.us/8340821
Resource
win10v2004-20231020-en
General
-
Target
http://adfoc.us/8340821
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 2176 msedge.exe 2176 msedge.exe 5032 identity_helper.exe 5032 identity_helper.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2176 wrote to memory of 4328 2176 msedge.exe 73 PID 2176 wrote to memory of 4328 2176 msedge.exe 73 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 3372 2176 msedge.exe 87 PID 2176 wrote to memory of 5036 2176 msedge.exe 86 PID 2176 wrote to memory of 5036 2176 msedge.exe 86 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88 PID 2176 wrote to memory of 1204 2176 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://adfoc.us/83408211⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0ba946f8,0x7ffd0ba94708,0x7ffd0ba947182⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5143301905511116773,9457599695829464261,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize720B
MD5ea2a93c813a31cbb9a72a92f04e56162
SHA180144efe2ce78f5cd68249297c944b203af1c5a4
SHA2564c74e72462b0d6d0ad28e2bceba616d06213e5841fab13447339b619aad1f099
SHA5128069ce914d6a8467e6e1bf94255fc84b41f3ce31558d1e31a88bdd23b13f5f9daaa6e3a883f1193a3d5c79765b7aa866dee54bf4917f8adef113c1abd1658379
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5fcc00ab4e5c54250534073c79b211683
SHA121eed7067cd3b795c2487db994b80ffc4931ca9e
SHA256ead060f0b26b1832bc84d7783de1ff08e493916b3759f0149b024a0885b28ba4
SHA51247f2e5847331c4bca3652958b0e1e85c0c21b892098ebab751b43e91f51849e91a047bbc6ba747f6ff3c908f220307a5703f3bd7d8a09a9389d4487fb36438c4
-
Filesize
6KB
MD5c9cadf23aefa635e032b533908a139d5
SHA189ebb531b4b27d9887e3be89f51554bbb1b08ea5
SHA256f430fbcb73b44a7d29f09040c3e30952d5b7557bc410d00a5271e016b35f3555
SHA512a06b219cd8527407c81a43a7becae18e2af447671669b1a19f55f6ae41e61a64eb4d23b656c9e162fe56fefa15094b5ba6178d4e61bc987e6f8c6c9446d10614
-
Filesize
5KB
MD578cfb3fd819a9e59f1664cef5b603ff3
SHA1353215445e503d79d752fa7e056e73ebd29c491d
SHA2565cb3659c98bbb2cf52e5b867f2d04ad9dd8fa41ede473f68705d6fdb1fe87b65
SHA51202b486e210dd1f1379f802b18bbfb52da310f734d8a54000d7a8c56e4144ec95ed84a7bb5de9e73a968a136647916ea2eee1675d9846fcd3afadb13b0ae44924
-
Filesize
6KB
MD507db89ba14ec0d4a7b5ad997cb23ad6a
SHA1feccbf91621e958d4010fc665efabe28d6041ab5
SHA256d8eeb69aa8cfc0a2582e2e872609b3f8de8518395720314a616eb4a3368edbba
SHA512a77439a5101f92b3ced801a385a5ad1564984a66ec05365c35336ded91f1d733aefa4e78805b7e3c62c164988ed58abea768a9bd650e8002aad1770ceafbb9e2
-
Filesize
24KB
MD5e05436aebb117e9919978ca32bbcefd9
SHA197b2af055317952ce42308ea69b82301320eb962
SHA256cc9bd0953e70356e31a957ad9a9b1926f5e2a9f6a297cdef303ac693a2a86b7f
SHA51211328e9514ffaa3c1eab84fae06595d75c8503bd5601adfd806182d46065752885a871b738439b356d1bb2c1ac71fc81e9d46bd2d0daa1b2ba0f40543bf952b9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59967ba0e891e80b2cb9e2e8ee1bebb4a
SHA1a94578355d5a45312c172df58345fc0d5e0e30d8
SHA25637c90e4ae710c970170764de0753cc80cc636ad569699984e7276a77d2005a9d
SHA512d12032ff8d02b9c628a825307152907579dd277fbf94e1bae67c978ece78a4b7afca87f1b0ac93a94f0631a43e763b91917380746b31e8fa55493b0de4a1fe11