Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 11:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://play.google.com/store/apps/details?id=com.ubnt.easyunifi&hl=en_CA&gl=US
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://play.google.com/store/apps/details?id=com.ubnt.easyunifi&hl=en_CA&gl=US
Resource
win10v2004-20231215-en
General
-
Target
https://play.google.com/store/apps/details?id=com.ubnt.easyunifi&hl=en_CA&gl=US
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 1572 msedge.exe 1572 msedge.exe 372 identity_helper.exe 372 identity_helper.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1436 1572 msedge.exe 26 PID 1572 wrote to memory of 1436 1572 msedge.exe 26 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 3172 1572 msedge.exe 59 PID 1572 wrote to memory of 2104 1572 msedge.exe 58 PID 1572 wrote to memory of 2104 1572 msedge.exe 58 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61 PID 1572 wrote to memory of 4668 1572 msedge.exe 61
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://play.google.com/store/apps/details?id=com.ubnt.easyunifi&hl=en_CA&gl=US1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0x74,0x110,0x7ffe115d46f8,0x7ffe115d4708,0x7ffe115d47182⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4452 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4710432763702862878,4033909491144140644,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5011193d03a2492ca44f9a78bdfb8caa5
SHA171c9ead344657b55b635898851385b5de45c7604
SHA256d21f642fdbc0f194081ffdd6a3d51b2781daef229ae6ba54c336156825b247a0
SHA512239c7d603721c694b7902996ba576c9d56acddca4e2e7bbe500039d26d0c6edafbbdc2d9f326f01d71e162872d6ff3247366481828e0659703507878ed3dd210
-
Filesize
201KB
MD5e3038f6bc551682771347013cf7e4e4f
SHA1f4593aba87d0a96d6f91f0e59464d7d4c74ed77e
SHA2566a55e169bc14e97dfcd7352b9bc4b834da37dd1e561282d8f2cc1dbf9964d29a
SHA5124bee876cea29ad19e6c41d57b3b7228f05f33f422e007dc1a8288fd1a207deb882c2789422e255a76c5bf21544f475689e7192b9a8a80dc2e87c94ee0bc6d75f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD560f17debbebeddc636e72b76e0b94de2
SHA1293278b1f2c0a5ba35e4a8f4846b6359c7112aa2
SHA25640c94c6b59c069e895885d8a05430e20e45d08261f0780371b1bcf8931bed84b
SHA5129786a2a6042dbd5d466f5d489f596e6954523c317d1fc178c10365bc3e94d819f617eb439488fdcfc0eafbc8860109abb947c328b5571faeaff0b045bf7679fe
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD518a0d434bed7b00b4798612d0d265750
SHA1c6e36150443249cd0e97b6c46b1e9b396015bcf3
SHA2563075a0e880099323b49ad63a4218a1bf197eb0d3e14bb101b0e4bab541addc2b
SHA5122ec46c9b2500a24d47f551f33355b7e90b698b97186aee91bf4d2ddbafef3f7b1b6ff2b2649cc4afc17901dd195628a95bf938a7d1a385a5a49cd739209072b9
-
Filesize
2KB
MD5bf18550c9b5e3f36dd898f5333d61324
SHA1ee8cb747eda5f51597dab0473eb901c2fa49dbbc
SHA256722bdb83935b12ef40067d67f972b99e5470bc3c8b478db474a8da016fe1f31f
SHA5124cd90703c1f6585f6c54f6aa785e4b02566661d4ce407bc47d31c14dc194b64a46a436874b3126fafbff4f888bfcd186f10f564c0cbd5a38e78b77c4e4395a88
-
Filesize
6KB
MD5b450f9699ee6c797403e3c7d79a6eb42
SHA1e057acacf7b25d971564adefe01b844984da4faf
SHA256d820affe175cb437ad0976fe8823997275c1a8f6a053a3a082a7fd881d45ef1c
SHA512a17199d3994e28782118964adb43e8ec3f015c5ef63e7c5e23943b48130bd460458612c650bb63731da49552f713aa5b8fef6efc27257dd974829901b4765bad
-
Filesize
5KB
MD50af2d1ca32f31fab5ecc3ac7cb3a2a2c
SHA112c1fff76e8f54f2679872ec47077895d333d557
SHA2564c2ebf659b16d54944850290fdac6e4fdc1274e8985ed80084760a95ff394044
SHA512c54eafcc71ed018c1a20837e71eb20709cc7be20654fa2150768796473c8c3666b1c89d938383217c2e657730d53d59029ce84e67d97bdfcc925477b000a98f4
-
Filesize
24KB
MD5f5b764fa779a5880b1fbe26496fe2448
SHA1aa46339e9208e7218fb66b15e62324eb1c0722e8
SHA25697de05bd79a3fd624c0d06f4cb63c244b20a035308ab249a5ef3e503a9338f3d
SHA5125bfc27e6164bcd0e42cd9aec04ba6bf3a82113ba4ad85aa5d34a550266e20ea6a6e55550ae669af4c2091319e505e1309d27b7c50269c157da0f004d246fe745
-
Filesize
705B
MD551fc628a716432c2f5ebb99a2015caaa
SHA10f1534b1aeac5384dcbb051c193da4e7ef0dfd53
SHA256d875667a9f1a2bae973dfdc4ab6279d3d4dc1cc582bf13c3e6d31e5836d34a17
SHA51231655a2b7678f769bfb5beb1dd4d140ba04bf27c1d4483942d1d97f5b23cfe85eeaf06fccec0e37563261ea763e0c5d39b16af2c4e58c47581133bbdf1b79555
-
Filesize
705B
MD562ab6f6c43a50dae5a98c3a879ced464
SHA17ab76274435b2a250ceec4988b0e417625c2fcae
SHA2562305224cbb5cc40094e527ae6eb8bdddff2b250e3bbf13b254eca1b8dbd6a94b
SHA5122fcc165a5b881b4f0e4edd5d97ae39c31a6cbf6de022bee6cb562f74e6e3b6385ca66149570376b983446703b51973f2e7ddcb1b02521eb8a59700b956d181f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53bfd0907cf23e0824428e7a0c6ce920d
SHA1055b81a22fd676f297774bca2aa585d29650032b
SHA256ffd05bfde6bca7d99c26311f5aa50a63033e405c8932ecf9025ab5e55399dbcf
SHA512b338ea19bec279363be03a3b600c747e8b3a896b3a067eafa5a5c2821a7d6af2d79dad401d90c752d857ff5238ddbae68d7a121a2b28528fe119f1ba89a568c5