Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
10/12/2023, 23:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://lodgemyatog0v-confirm.info
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
http://lodgemyatog0v-confirm.info
Resource
win10v2004-20231130-en
Behavioral task
behavioral3
Sample
http://lodgemyatog0v-confirm.info
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral4
Sample
http://lodgemyatog0v-confirm.info
Resource
android-x64-20231023.1-en
Behavioral task
behavioral5
Sample
http://lodgemyatog0v-confirm.info
Resource
android-x64-arm64-20231023-en
General
-
Target
http://lodgemyatog0v-confirm.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 724 msedge.exe 724 msedge.exe 4628 msedge.exe 4628 msedge.exe 1296 identity_helper.exe 1296 identity_helper.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4628 wrote to memory of 5076 4628 msedge.exe 14 PID 4628 wrote to memory of 5076 4628 msedge.exe 14 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 2080 4628 msedge.exe 28 PID 4628 wrote to memory of 724 4628 msedge.exe 22 PID 4628 wrote to memory of 724 4628 msedge.exe 22 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19 PID 4628 wrote to memory of 1860 4628 msedge.exe 19
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82a6d46f8,0x7ff82a6d4708,0x7ff82a6d47181⤵PID:5076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://lodgemyatog0v-confirm.info1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2000 /prefetch:12⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6925767631255000099,14687206726617771062,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD558a9ee207caef8b6881b10e37b4cbc97
SHA1fa5f0c8626915f39161abb48df2212a79c9c6abb
SHA256fa60e147e18bd39cb6ce21d725ef37a2072d1d682547d9f7393d3f99e63711f4
SHA512dd20d10299a8c628c74adb51239c3869a01a731e42946f0039c9138c03524d8c8a940716226f10aab0b0c7aa230195a27e91aea54eed611c6e5dc9f02fa90355
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD54e645b715aaa1fe60332ffda8dc5ac4b
SHA1c485f987ada35c215eb4396ed7ee76ab46755081
SHA256dbf336b977be005ee858791b3b38612e4d2dfe75f53567ab5177d6259049840b
SHA5126eb11b3be1456552e58129e3fabb65a7c13f2232a87490ae1b582e56340d110f93db749de0c2505b14dd2e93a42d31c7339dc9a66454a1d634376f2f0b3dd01d
-
Filesize
5KB
MD50de743da3caf33c69f86dcf7dc9f6e79
SHA13a61a2bfab8d842385ecc7c1bfa131636b722b1d
SHA256c4ffc1723577512d87a3dedc47691d3a7cdaa7debbdde6d4fa3cd956eda4b46f
SHA51200f713036921114046af52da05edfc88fec924f1bf5b06a8af987ce82463fe5122ddd48da823649f5d5d1d6ddad77e1bccc9f0c512f5a2432c00916434a187db
-
Filesize
24KB
MD57be049d7c959fde1e41f35b7a720efe9
SHA152ad63c6660922da4e8f6adeb3ffc02c4680b5f6
SHA2563e0f584c3f5eed5d694d28d0341dbeccd25f72ffc95dd44082cd087a8e7dddb3
SHA5124d46689ec5be60bc5e4de95f0547bde8670a99c483fe9395f2df77e78a4f1f438d5865a024a6daecce3c0e7314d006b3e84682bc7e201e521f7c33b3343590da
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55e27da669da1866c6ca14fabc4612203
SHA119662160c573e7a7ab264d1ef11025099328ecde
SHA256af29eb7546f6f5b7a976cad363c7ef3b5dd6506fb552eabc90eab38a7d2e2343
SHA51268dfd519051ff329631192007ea31d92eada4be0da0596908b6f64fe0f28d0aab4429bfa675362f018220812eb49ce0c6c9ddbfbb9e2c46a587fdb4adb5a567f