Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 19:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://incomes-jalan.swanndvr.net/re/home-secure-login.html
Resource
win10v2004-20231020-en
General
-
Target
https://incomes-jalan.swanndvr.net/re/home-secure-login.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4956 msedge.exe 4956 msedge.exe 4444 msedge.exe 4444 msedge.exe 4204 identity_helper.exe 4204 identity_helper.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 804 4956 msedge.exe 83 PID 4956 wrote to memory of 804 4956 msedge.exe 83 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4856 4956 msedge.exe 89 PID 4956 wrote to memory of 4444 4956 msedge.exe 87 PID 4956 wrote to memory of 4444 4956 msedge.exe 87 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88 PID 4956 wrote to memory of 2160 4956 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://incomes-jalan.swanndvr.net/re/home-secure-login.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0b9c46f8,0x7ffc0b9c4708,0x7ffc0b9c47182⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,17626694245544024137,18143022130884581728,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD55e84d7ad0f7c64e8046df218dd51213d
SHA1d0db5c0ddfda86f018d05e98e3d71358b31bf5cc
SHA256362ac96e0d602764cda0273d9c193dcad90a8d92c05c439c55135020bdb9d652
SHA51296ca609f594a65c7ef9279f1e41292e03a021c31bd3f73a1b3764c9f1afcd2a417d4b59f4dd1f433ace23ae0f2c621ae8f47664c73d3713b8ec282ab8fa1dba0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
194B
MD5748b645aba5ea07701d09451852ac0d2
SHA15f61e77ccf82c7d0214c3609cb0555acc436371d
SHA2564aeda9eaaaddf7057aa68f5f2d08b75dd335c36544339d1306e47e61c77e53d2
SHA51269318550b1d9cabfa24faa22848a795b29619f9e77484431e1e83f7bad5c6f140b0ad8b477de5bf0fad3ca56717eac1a61bbade3419214de2ad31e38d420cd24
-
Filesize
5KB
MD5bfac492aa12fb10f78da962600889495
SHA16f5029658baf4212a7f936e3b259d03404eb1636
SHA25665b0c493b2b20423b523752a8ac7d0c4a8109bf2dae71631d6b2338eef56313c
SHA512b0eaf226d4c0eaeeea9fecb14476b6ec3b87b756e0726c480177840e343a77db2218421d85a645b843e613e717a34a9fe6dd9bfe5059aaa08a997bbbd8dddbbc
-
Filesize
5KB
MD595b1e3b752240db56a16c4bb73f0a2ea
SHA16cfdfaf9df4ba18e43d009ed916dd6441d83b641
SHA256e88c4eb098d864fe9b0c0b38102868c603d693e2d49764f9e863a0e62a28b861
SHA512d25c90fa78736e54fc497f924531fcddae1cf0273c1885490d685623dacb0c8c45d7fd78bd97432a0e9afac482602639a9abfc3e63203aa4a0d42e4af095544f
-
Filesize
24KB
MD5fd20981c7184673929dfcab50885629b
SHA114c2437aad662b119689008273844bac535f946c
SHA25628b7a1e7b492fff3e5268a6cd480721f211ceb6f2f999f3698b3b8cbd304bb22
SHA512b99520bbca4d2b39f8bedb59944ad97714a3c9b8a87393719f1cbc40ed63c5834979f49346d31072c4d354c612ab4db9bf7f16e7c15d6802c9ea507d8c46af75
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b130f395be42c7c3d82991a6857c11ea
SHA18d19f7f447f1eaaa260025b8b776652e706b08c2
SHA256739e68e2cb2042e2134003aa8b6d2dcb988a76da67be68a81ee320be6af48c24
SHA51243bc32c00751dec7f7c057234b0fa4f5ea09ed5c3a96c319ac858ee025878ed31cd22c5cb8313e0798b2dbf4027617d8f9dcb64e17b25746abdbd51cbcf97ebe