Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 08:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://xticvfmt.page.link/Tkyi9cvUyNMECA6x6
Resource
win10v2004-20231025-en
General
-
Target
https://xticvfmt.page.link/Tkyi9cvUyNMECA6x6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 2676 msedge.exe 2676 msedge.exe 3764 identity_helper.exe 3764 identity_helper.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2848 2676 msedge.exe 76 PID 2676 wrote to memory of 2848 2676 msedge.exe 76 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 4312 2676 msedge.exe 86 PID 2676 wrote to memory of 1736 2676 msedge.exe 84 PID 2676 wrote to memory of 1736 2676 msedge.exe 84 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85 PID 2676 wrote to memory of 2084 2676 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://xticvfmt.page.link/Tkyi9cvUyNMECA6x61⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b41e46f8,0x7ff8b41e4708,0x7ff8b41e47182⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18158900213419462271,1714503073910561710,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5aed593b08b94f34dd8f68fd369652ac2
SHA13ce2a17e426e09c2fd9a8d2ab191fe29248f2d95
SHA2565c0cdd5dc1bccf7e3ffa8568fdd2fe35f3edc85832f3d11331aced965aaeeba7
SHA51216b34c29d8ea3793f7d4491847d2fecae2c6c9d7b7b1ec16d1367828d0a4da4cdbf912c2040bc0ca98ac32cd701355ddd16b4865629d51bae2527e1a05411137
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD58acc53ef1e15bc7a5aefe1fe3539cf4f
SHA101f8d7716650022e49b2101648eb4edecdfd01d0
SHA2560ed676782d59d72e7c3f5ca03db8c0f0b353914c67be4e8fee8aae73151cdc0b
SHA512f2c2e056b35a6eda79012bee3858fadbdb7c4933441d2b6372f8b658aebc7baf89e936d5650d8155fdbd784c3240da69475835e4f4bfb3fba6ef0cfd142d7f9d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
668B
MD509f67c1cf059952d72a4db9cbaac331a
SHA1852240592e6737773746110c226bcca1728b6ef8
SHA256242b7d1e4bdd6645b6ca8ed189fe8f5f2bc73e213e10765f0bf6ebc4026b280a
SHA51275c63aaabdc2f3442f1dc24c5e3a871b4153383af01419dfc89947dce79aa20634723cb3f4f9c2909f2ac9e945171d3403fa2c355a1ec5b8525691e5a0360be7
-
Filesize
6KB
MD572f7108d5fb42dbd39627d3af088586d
SHA100e9cebd953f73c56712a9483e248438b22504be
SHA25654668b96e320a2a526ab674bf3a9e9640949961d60f630ff8afdc5c94bcaa579
SHA512f40f9add268453bc9b487d9666d518adbfd5522b3b6fb7393cf5fd93829772f89704bd719be8befde761ebfaf9a7bc9f23dca24d508af1b50c91f2aae9c8f2dc
-
Filesize
5KB
MD5938af71cbda665c67b038b181d436185
SHA1f216e822a1a59ab3a8ea3a23625e27ec63ecfa76
SHA256c68f282d9ce4b3e3451fa0c2ddc3352955dce6b59d59994a6a47f7e668701720
SHA512e8e3ff3c9d9f6724c08c9b03ace17a6a7bb83a7afe945612c45c52836c31a6f349fcf8cd008f9fd7eb7857434e3a853401c7209d13be5aa1d2a73cf19099c688
-
Filesize
24KB
MD5e2565e589c9c038c551766400aefc665
SHA177893bb0d295c2737e31a3f539572367c946ab27
SHA256172017da29bce2bfe0c8b4577a9b8e7a97a0585fd85697f51261f39b28877e80
SHA5125a33ce3d048f2443c5d1aee3922693decc19c4d172aff0b059b31af3b56aa5e413902f9a9634e5ee874b046ae63a0531985b0361467b62e977dcff7fc9913c4d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ee5289a89c6300260186328317352daf
SHA131586ec8f96e4a2c695e04177d69f1fbf967d7b7
SHA2563a7363199c5b34a3a5c54063341c87139b62dc5c7371b817ae8b0fee218f7eb5
SHA5123528f2189e3009986f037ea0fa0b8526f57e2f6f27cfda5ce2c40689af13a603f59243d47da9b8aaf17cc029123dd0955053d4c35af892ffdebd8430423ccfb1
-
Filesize
10KB
MD5bcdeeb0180774b3bc5b432b29d6d710f
SHA172d18fcbdde4f6d892536e3ff1b8daa181180764
SHA25600c900545fee798f2373f0f6a38eb94e3fb7d422ebf1504347961ebc40d723e1
SHA512937d7bdd41ed66fa46868fe2efb0c98afdf80e6b99021fa41b9b68ddd8d986a3034070a853552674e299cbedc74b76b2b84479bb9a6b4a4ec2e0dbfc0c87cab6