Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
11/12/2023, 11:36
231211-nqmgfaddhm 111/12/2023, 11:21
231211-ngf83adbfr 111/12/2023, 11:16
231211-ndhmqadagp 1Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 11:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bupa2024akl.com
Resource
win10v2004-20231130-en
General
-
Target
http://bupa2024akl.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4328 msedge.exe 4328 msedge.exe 1836 identity_helper.exe 1836 identity_helper.exe 5552 msedge.exe 5552 msedge.exe 5552 msedge.exe 5552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4328 wrote to memory of 1704 4328 msedge.exe 35 PID 4328 wrote to memory of 1704 4328 msedge.exe 35 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4932 4328 msedge.exe 89 PID 4328 wrote to memory of 4148 4328 msedge.exe 87 PID 4328 wrote to memory of 4148 4328 msedge.exe 87 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88 PID 4328 wrote to memory of 4024 4328 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bupa2024akl.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc74346f8,0x7fffc7434708,0x7fffc74347182⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3476 /prefetch:82⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5452 /prefetch:82⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2188 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2868168673437518016,10785096135373018404,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f5a4c6badd2d2e8a3304abb9a11472de
SHA1e828b3d3ebdb7c9a0614a8ac841ab37ab02f43ff
SHA25691565214f61d724e6cf0fc73439df2305bbed1fb0845c2df4e0bac7c6a9ab5e4
SHA5125f1993419ead73faee9ab644bb8fe3c395e185d4c61e8e7fc89c675aa5a99debdad11415c1f0797f0af53598ab56d75dd934f395fdfdfe8a0646c67a20d99d46
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5973b70f34fdf5524c11121a37b3ca8dd
SHA1a378d3595563864c9da60942a15182ddfc208095
SHA2561e43b9abad776b0c4a0e76cad3139259d402dbef61ccb692d989f5f12880ae5e
SHA512d91edcf3fcb07b6c8c9c03647e03f6178610440fca3257aafa43c55dde5d045bd2c4b3e411ccc707d0c363d9727634d65914b081ea4940e4da653a8983f36335
-
Filesize
1KB
MD54e80fa0a80b2823b51cff02eef23a9a7
SHA1cc33e1003193ca04c88d72c89d5d81734fdedc4b
SHA2560f332a28d47af3a53228f05896c0970b3e8d1823e51d8f15e49e31f9ac905815
SHA5129304778ecf0597ced28b6209c38a024132f6fe639efd629aabe53ca7c80b7f84ef23e4faec4096ba69b44a6f65b21e8891b3907846094899c766d71319cc62da
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD516976342e12faad65927849b73215257
SHA196bf6821e8349a5771e0ca67293f29f9bd2a8e52
SHA2568d4b0638f607b2c7abde4b894ee7570a3c939905911550a60a8b04fd8c08788a
SHA512280d4075b162a18d0fb297d5f0b1a90621c7186c8990c19b2da7e997f905a62fce354fbba9d36289c3b905d1a6fbaa366e00ac85f564af4b75e81c2662841dcd
-
Filesize
6KB
MD5cbe0c4639932fbbdedd14245ceae6bc1
SHA1428df40427bf2d5cf0e998d551b488764a195751
SHA25607f396a2f67eeb62d6910b52685ac4d3a845ff3bff040d437c8e0e38c607ffaa
SHA512be45eb58d2da96c7dc3d5debd7ebf2ffab965d5e9cc94f73b5159c9583964095f8cef7a0bf1147eaa8196433f873e36d16ad41ac025c2e630953a670056f0847
-
Filesize
24KB
MD579ee199d139b247c1cbb9f6c4e7c70a3
SHA1006dc05421727f7f7bb54fafeb2aa1ecfc118d07
SHA256105fca020c6e738b89e1df16c225a1dee15a35e8a2f51880f8ed70862fb8633e
SHA512fc24fd31b596306e42b8a89452c3449ae14a3b71427fb5a8c47664bdba5b5a161083d9da41c1e18f67b254ebef519702b5717feaaccd3ea95cfa1af80fc3a522
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e2eec7e1a7bf979427f619215be8775a
SHA1cd0862d359ad651e88c77f23ed2a8a1246e82821
SHA2563f3f856c6555caf5a915bad19a14910b18471df777faf8a8af0262d4a12f4a5c
SHA51227cf6745b6d05019d1067fc22a07c08c26261cf704b698c705aae49bab5e9bd256f71df5cd7bcb44fdd277288c48066eeb53a97cc0bfcd369d2b9d423288ca2a