Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/10/2023, 11:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.abnamro.nl/nl/prive/abnamro/veilig-bankieren/fraude-herkennen/telefonische-oplichting.html?ext=reply_valse_email_telefonische_oplichting
Resource
win10v2004-20231020-en
General
-
Target
https://www.abnamro.nl/nl/prive/abnamro/veilig-bankieren/fraude-herkennen/telefonische-oplichting.html?ext=reply_valse_email_telefonische_oplichting
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 792 msedge.exe 792 msedge.exe 1792 identity_helper.exe 1792 identity_helper.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe 792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 792 wrote to memory of 4500 792 msedge.exe 30 PID 792 wrote to memory of 4500 792 msedge.exe 30 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 804 792 msedge.exe 88 PID 792 wrote to memory of 3432 792 msedge.exe 86 PID 792 wrote to memory of 3432 792 msedge.exe 86 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87 PID 792 wrote to memory of 4016 792 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.abnamro.nl/nl/prive/abnamro/veilig-bankieren/fraude-herkennen/telefonische-oplichting.html?ext=reply_valse_email_telefonische_oplichting1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac0b46f8,0x7ffbac0b4708,0x7ffbac0b47182⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,5542534782954857859,6938302118760020112,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize984B
MD5375214e16c980b12aaac83b5c1912fa7
SHA13325bce64f818dadc11a853771dcf16d1ca0a4ae
SHA256cdcbe9f158c360cde3da5f0b1aee31e5ecf75eef81e929d7adc475f750ab9be6
SHA512b1fea6d6f059f48a5728e2205da69e9acf4ea1b2fa6ff22944383fe3d6207a87d4518ef2182ff6cc290d59c54a2e93ee240ce020e7a2ce0a28f65f9a106e54ea
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD58602e91fffd23cd076602c94cec3cc90
SHA130094207e4cccbec03efb4e5bd305f7179272a34
SHA2560d08d31620c7cd5001482cfa1d064b24aae075f7429dd5a0ea3dcf485375eb2d
SHA512359c7108f9ea0be1216e7b2924129146b4140f13317a924916630e673b48563a53a9c3674b49a6e3c7a0989c22a4c6dd4cae75ab673f71c6923afbbdc29d6364
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5fc4647d57a0a3c034276bd334621c236
SHA178e5212bb1adc04d163b04909485597712e1d1d3
SHA256708727c58edebe63515752cb4529f99d025543da2f4dea86c8ea7f0de1ccefd7
SHA5126d8905b82eaf2ae70eb987b02e7a0cb4f90ecdddc482465da086284c1365d53c935eda4f63119f9d9d9180898d5130ef15f8f89556d4df381e06cd9f66f5cd84
-
Filesize
5KB
MD54be98da0d5320ee47fc015d9073b31f0
SHA109bb495f228c9f7534415fed3825b209c6eb7621
SHA2569cf3503ac9596e82e80fc1dfe9c4ae25f7aff79a60f380c4caa5b0f35049f0e9
SHA512cd96b38b1e57ac79ea2c87f9561c3dbc286cea64e220208b34b2293b47976f05e01233f2a064cea848f298f93c03267c81658bbfdf876adfcc1f742e7d25a32c
-
Filesize
24KB
MD5fd20981c7184673929dfcab50885629b
SHA114c2437aad662b119689008273844bac535f946c
SHA25628b7a1e7b492fff3e5268a6cd480721f211ceb6f2f999f3698b3b8cbd304bb22
SHA512b99520bbca4d2b39f8bedb59944ad97714a3c9b8a87393719f1cbc40ed63c5834979f49346d31072c4d354c612ab4db9bf7f16e7c15d6802c9ea507d8c46af75
-
Filesize
1KB
MD5ac68d39555fb8f866c658e34bc8a6fc8
SHA1dccd27c7f3dba93a066d15a67ab09bd3288f7ad4
SHA256f7471c26c9b5bcfa87ed9cf8c2fd609916f4bf05bf3e5cbbd24b5fd66d271d7b
SHA51250e614e77308eade6bf3f189b001d1c07d136b8bd0451376f7b999304c2aa8a616fc52b384ff63897beccc17fc35c4093f459560cc35fea7e293b23e49aceaa3
-
Filesize
1KB
MD52029943448eb509ffe976fcb19936e0e
SHA1d5b4500645cd7c45bc6db895d2fa9d9d98ec3235
SHA256117e7e5985cd94bbc994cbd693ef7d508662c1259c10c0491cb85bad9ea9c411
SHA51280dc8db02ec64e9213a798289ca54cd3f11efd1b5a8910fe5ab7f1cb7d0f9ea8ee20a0e70b4ac7e68044a41c4e576e24ba21a376bd3992498da487d9d788b1c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cac216134f51366790abeea95a883b1f
SHA19189654860956f64e9fd4d47f6dc94946790e72b
SHA25648088286d4b08a38e6f320f48c3ddb466922bd6c25075027f07252deeb01d6c9
SHA5123ab01da9735b93d6960d825e8c2c055a6e0f31bccd51ac47e60805ca9c0d8ca551b45d1e5777a5879682c78c27d846dca1f67afb0910df07c979251be3194b8e