Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 13:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://okcdivorcelawyers.com/hmr/?sst=ZGF2aWQuYS5jaGFsbGlub3JAZWhpLmNvbSA=&re=0Ws2L2DJvlv2&id=hmr
Resource
win10v2004-20231023-en
General
-
Target
https://okcdivorcelawyers.com/hmr/?sst=ZGF2aWQuYS5jaGFsbGlub3JAZWhpLmNvbSA=&re=0Ws2L2DJvlv2&id=hmr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 2884 msedge.exe 2884 msedge.exe 2500 identity_helper.exe 2500 identity_helper.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 1872 2884 msedge.exe 40 PID 2884 wrote to memory of 1872 2884 msedge.exe 40 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1560 2884 msedge.exe 86 PID 2884 wrote to memory of 1888 2884 msedge.exe 85 PID 2884 wrote to memory of 1888 2884 msedge.exe 85 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87 PID 2884 wrote to memory of 3832 2884 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://okcdivorcelawyers.com/hmr/?sst=ZGF2aWQuYS5jaGFsbGlub3JAZWhpLmNvbSA=&re=0Ws2L2DJvlv2&id=hmr1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb131746f8,0x7ffb13174708,0x7ffb131747182⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,9520983349600192867,14961580326987164814,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
Filesize
189B
MD5bb62abd2d42e1e7de9c2fcc2d81b903d
SHA113f275ec89beaf5eb4208173ecba241e26480be6
SHA25678b410da3bb563ffc89cdd5b5f2f00eae8a131af7ebd8a286a722470979470ba
SHA512542a42d464c4433e1493ca7dce139c5c4b302238b4b8518e26548eaf88e34877b6a2a8cec78359fb3b025036567388bd4780eee17335bb496f2327c988769b1f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD536f4a34aab2c54e9d4283d690cbc9f37
SHA16347a947ccbb491bbaf5a9da7d8d63a119353896
SHA2569f63174f774e9ba889d6b4217ecaf6f8faa0d0fcff5917ff7115680467bff8f8
SHA5126bb98050745b6a6197849053ec86a0e6bb8f85c31a5257b819d8207078383837bcedac06a37f1869225999ce8a4a5702941ee6e686e30cfc39612caea718ceb7
-
Filesize
5KB
MD59710c41fe120e8ab693b3ae7b4bbef04
SHA13aba76539c29ba959ca4eb3e40bf0aa95362b1dc
SHA2563823f34d0af0a579b91d32b5342be1fd19431da1d9f828a43045b35e8615ed6a
SHA51217642ab2b91d83b6ab53942be494c157781b6ffcd37896e8f00eefe996d4263d42fc19e93b2e6d747705c4a47ee31dc89c5a226e320d4355f4d9f8a6466ecfcd
-
Filesize
24KB
MD5918ecd7940dcab6b9f4b8bdd4d3772b2
SHA17c0c6962a6cd37d91c2ebf3ad542b3876dc466e4
SHA2563123072fba0ea8e8f960dd213659a0c96ce2b58683593b8ea84efac772b25175
SHA512c96044501a0a6a65140bc7710a81d29dac35fc6a6fd18fbb4fa5d584e9dc79a059e51cbe063ca496d72558e459ffa6c2913f3893f0a3c0f8002bbca1d1b98ea2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD519ece87801f4989e9fa4bafd065d1f6f
SHA121431ca7ebfe0af7ea008a20cf9edf8ea977ddf2
SHA2562a779cee3875eefd9a8c4a653194121c61ae21263fa45459516438d6b94f0593
SHA51235d66e896fa481a2f5a51b159fa4ee5b9d87075d9b30abb4ddc2c7418a117f39bc8de4b04adcc9d38a5055fe05a853ad5b473f14930dc69638a6ea1fbc453cda