Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows11-21h2_x64 -
resource
win11-20231129-en -
resource tags
arch:x64arch:x86image:win11-20231129-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/12/2023, 01:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://assets.nflxext.com/us/email/gem/nflx.png
Resource
win11-20231129-en
General
-
Target
https://assets.nflxext.com/us/email/gem/nflx.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 1976 msedge.exe 1976 msedge.exe 2404 msedge.exe 2404 msedge.exe 4780 identity_helper.exe 4780 identity_helper.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3236 1976 msedge.exe 62 PID 1976 wrote to memory of 3236 1976 msedge.exe 62 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2864 1976 msedge.exe 80 PID 1976 wrote to memory of 2748 1976 msedge.exe 79 PID 1976 wrote to memory of 2748 1976 msedge.exe 79 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81 PID 1976 wrote to memory of 3552 1976 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://assets.nflxext.com/us/email/gem/nflx.png1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcbae83cb8,0x7ffcbae83cc8,0x7ffcbae83cd82⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2576 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,356818067339362612,7777465270387884431,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD514e9465c402b5bcca1c1a5dfc22d7d90
SHA1594df1de88b4a29906adba222e4f86e8883015ee
SHA256152b5faa97c13b54704dee55ee0a0f0e1b9aec33e899e91a441cbbc9af072ff1
SHA5124af6de55f21d41cc7c74ba97b6a9ee5ccce89a06139d7fe0b61f3cd7941f17968c17e448aa9f49694fb7efd4bd701e2e689147a2b6867cb2c63d56ccbb3dbd1a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5bc1e7f9f538d0a3b7f0801dddc3aa478
SHA195b0530a6aa42a035e27f05af4376c0ac532040b
SHA2562195f6fb28d66f28a8ccb56e1c481efda2a6f8bcad39b5ef60cd2b873b5fe4f6
SHA5128058c8f03e054a27a64dbf5a2485c63c38bf8d30d656bdd301b9e76901a988805ec7e99efc13a752d6f49bcbfa597a6ee1912caec7f8bac2788ef8edcd687fce
-
Filesize
5KB
MD557f0398bb47cf86b8c3d3152a45468a9
SHA16e4ccc52c075c5f588237234c2acdf4c1ad6f7da
SHA2561f05c0d59ea52734e3dcc443e7ddb407fe0574cee82b487dce689769ce88fc4c
SHA51269c8a941a222bf4c519a9f9db1a53811e72a2e0bdaba1ead091581e521445313729982aa7c8960ef8c53a31b0332ba4b1c75f06a3abcb142cb71f110b9238b7a
-
Filesize
25KB
MD529669c3d8ce4cf97ae1e71b024af98a0
SHA11130d1d8db8d973b857e86382916701f55db6788
SHA256189200b96fe5f90ef155d2401cce953ebcef1b38900eb4f351c4ffedc6e424be
SHA5129dba40f2697dbf63f27d29c2d1de0af60b58240066fc21c1bda1775129f15f32f6449050519c7deb07621d1ca4f36d18298ed4e36018c7bae5f38722f9bbeb46
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dff4f26e306f000b9a2cd21c977462b2
SHA1f22619f0f88447efd4f4d8e0deceba9a0813418d
SHA2567e6473a99686d1f4027e709d312a88951bea0cf8d085562e02c400c6bf21e23c
SHA512e1839b5e2d76f22305e99132091be222abba97730f04c77e20b42f102d6c8b855e3ae575de681e21525a1bf9f7e929aa3cfbb8bef3d936a80047ab5a02010fed