Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 07:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://nl-xtoolsx.com/ip/index.php
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
https://nl-xtoolsx.com/ip/index.php
Resource
win10v2004-20231127-en
General
-
Target
https://nl-xtoolsx.com/ip/index.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 3904 msedge.exe 3904 msedge.exe 1764 identity_helper.exe 1764 identity_helper.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3032 3904 msedge.exe 75 PID 3904 wrote to memory of 3032 3904 msedge.exe 75 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 5084 3904 msedge.exe 88 PID 3904 wrote to memory of 2452 3904 msedge.exe 87 PID 3904 wrote to memory of 2452 3904 msedge.exe 87 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89 PID 3904 wrote to memory of 2312 3904 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://nl-xtoolsx.com/ip/index.php1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa548e46f8,0x7ffa548e4708,0x7ffa548e47182⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14869257468136886054,17169715607069589562,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59757335dca53b623d3211674e1e5c0e3
SHA1d66177f71ab5ed83fefece6042269b5b7cd06e72
SHA25602f0348e2af36f2955efda1613dc6480f1c68c8e55f19590b7b58e9355c6a940
SHA512f13351398f5dd5b6cf638b174dc50ddc782b690c6d4736d48941923a3425b5dff4a9aa0da22773e9abc9559d40f020f268018db902e0a7772b7b1f4d21126f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5ae56c4b6c7025f016a47153c12d9eebb
SHA144cf457978e6513e73f908881a1a1e06aeb88e1c
SHA256c543e520f7b35e42d242f8b74769c009f62e7e97dfb6f26ba33f70331ea3a6e0
SHA51290d890203b71ff14e18b5c0f9f61f188db86162f6f63fe6ceaef6dfa46efb70071461f87f1a047ae102b30a53fd1040114f312b04bd427dffeefaf629771352f
-
Filesize
471B
MD52b300a1b20bd5b3035c940037b468675
SHA1dbe30ddb57fdd9e94b2d8adc52963d78c4d83b6f
SHA2567885311e115b4b2ebc077979d0cbbdc5845be3080dc809396385b1f01dca6ab3
SHA512ea34c028471dc9003fe9c1671b9be34157c42d8773e7c8f68ca33d16f88a3e8d1fbba45e5565636c83a99ee2905369d46adea0a47b1529e8be76d73d644564f1
-
Filesize
5KB
MD50b50aa847225d18bafb5823abf097715
SHA1c270c7c370caf9b3ca6730ae237bf2e0d1df5360
SHA2564bd66f69f087a0d72e32b9b5b626d4f25bbe13ee9b6f01cda0a139d8dfae170c
SHA512111442d338626dd5b1bde7fdbdd366a4f8a2abbc70e87b1462c3d3cb9732df736cfd30cb132d7922b41cf5114591c2601e5051e3f557d7fd6bfc67a7e085effc
-
Filesize
5KB
MD5a5a87ffc9a01dcb802a1b836827f6376
SHA11db36e6bd0e8d87cd3fabc17e213d2a5193eb68e
SHA256d662232f7595159aab690ebb73925ee63c4411db9e58e11f288875a2611a361c
SHA512b6b6928e493fce190b4c37780440b955c1e0205a134cf2ecfcea64c81e408271105c6bd419c60c826dc476b8d1a7b937c6336daf8fe590382699cb15387ef8ce
-
Filesize
24KB
MD5c0499655f74785ff5fb5b5abf5b2f488
SHA1334f08bdb5d7564d1b11e543a2d431bd05b8bdd1
SHA2566aa332a4d21802b2dbcd08e153764da60f538ceb0daaaaf7504ba8f67c08ef03
SHA5125f0cec6dd823f2b3ac62017383dbbf71ed38893724312ec75e73fb197e0bcd5418bb70fdfe9150f5ca495d5f8547d8a08618bdacb5010514a3cb1101437d698e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ade5beea32fd94db361630d462d51a58
SHA1f8f0777fbac5eaa89e3b96d0b6bccc17f7e6624b
SHA2560acf1dda24e44ef29d5ccd4b9c76862620e8e40a0b6c5a908dfbba519cab3ac3
SHA51237a645aff30d0bf942608b640fec5bac0b00394652d49ca469c6013dd964727e63b13786ded224936dcf46fdc8887a195ede468a559bbe5d1651357e28d3ba81