Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
1057ef742ecade1f8cb5b743ce44b35a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1057ef742ecade1f8cb5b743ce44b35a.exe
Resource
win10v2004-20231215-en
General
-
Target
1057ef742ecade1f8cb5b743ce44b35a.exe
-
Size
30KB
-
MD5
1057ef742ecade1f8cb5b743ce44b35a
-
SHA1
49dd35680bd6ba1f75863f17c0fe3e9ef57e7a32
-
SHA256
79fc79f478c7b63f606dbfac1caec4232976170586d22faccc74263f868121c0
-
SHA512
fcbd992726785da757c43b758e4c778aeb3db3506710e48f15ed10e936a48151639d230bf2d871bcc9ad762c7aed841286b428ce7912fa35b7e1b5a1e27d1cdc
-
SSDEEP
768:TAwb6sRAIhqbKl4sFZxuufnMwHWedW/jJav:TAwmsKN5YnMXedKjJav
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 2336 msedge.exe 2336 msedge.exe 5516 identity_helper.exe 5516 identity_helper.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4524 1057ef742ecade1f8cb5b743ce44b35a.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4524 1057ef742ecade1f8cb5b743ce44b35a.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 2336 4524 1057ef742ecade1f8cb5b743ce44b35a.exe 96 PID 4524 wrote to memory of 2336 4524 1057ef742ecade1f8cb5b743ce44b35a.exe 96 PID 2336 wrote to memory of 1776 2336 msedge.exe 97 PID 2336 wrote to memory of 1776 2336 msedge.exe 97 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4084 2336 msedge.exe 99 PID 2336 wrote to memory of 4256 2336 msedge.exe 98 PID 2336 wrote to memory of 4256 2336 msedge.exe 98 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100 PID 2336 wrote to memory of 2040 2336 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\1057ef742ecade1f8cb5b743ce44b35a.exe"C:\Users\Admin\AppData\Local\Temp\1057ef742ecade1f8cb5b743ce44b35a.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://lwteam.ru/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff345546f8,0x7fff34554708,0x7fff345547183⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:23⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:83⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:13⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:13⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:83⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:13⤵PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:13⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:13⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:13⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11507263459642025277,18155864929169781259,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5788
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d5564ccbd62bac229941d2812fc4bfba
SHA10483f8496225a0f2ca0d2151fab40e8f4f61ab6d
SHA256d259ff04090cbde3b87a54554d6e2b8a33ba81e9483acbbe3e6bad15cbde4921
SHA512300cda7933e8af577bdc1b20e6d4279d1e418cdb0571c928b1568bfea3c231ba632ccb67313ae73ddeae5586d85db95caffaedd23e973d437f8496a8c5a15025
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD58806b38221d1a5fbd2c3e04913ab94ac
SHA13a4e67051e01db7f7a585b7c11faa9a93526b2f4
SHA256255502a01c060f2fba5cb749a843b9f4b117da84d394f0d005c0207579c3dbc9
SHA5127201ae9555358cf7a9b0f6494bd79f25a63b3694abec4b230b0c7c3c10cebc17769fb520da49d720ebb3172781fea80f23e653edec76bb20a728767f1d4523c5
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5dd8efe6ad9fceb2c807d12970df2d4da
SHA1bdac0a05390394a2ce18efcd3b7301883494763d
SHA25686236f3972dec8eb01c4acdfb7238b1608c3cff3043e5e6ef74b2fec085ff4cd
SHA5129265015f0b9a4f56f0e025f227cd7982fb9476b1a51ee7d0714a1e17b7cc9a17b2e4edfc5f3cf6dfd3bc62287b8e8adcd288c83a244505dcb03f74281281ee71
-
Filesize
7KB
MD51a6d9f4cc2ef77f951fa687f8a1f2994
SHA12ecc893847fe660ef9bab86787a0244dc5075601
SHA256eefa294869c5bf17b117a1357609d62d9082fd6a3bd6fc71300dfe7b8ec3dc54
SHA5129f0e21d7fa2ac9e80165a3ca7ee0737126280ad4e4dc703af045f4faed92077811020bc93b1db4ac1ebe0f43824adbe3ddded9a39445aa8a75958c768263f485
-
Filesize
5KB
MD511456c829bf92aa0e69663511528c72c
SHA1d1ad9b3bbef87bb49a225e9c0cad94e380e68b49
SHA256ee0b3b524dc98692c659e6933df125e9c3518bad81a4351b7143fede48334f34
SHA5128f493883f35c2c04901172325c576aa8c9c099dac433af4ade6b857448118ea2fb0b90a13852ab4fcc9c80d71068031157773d4c5484eb95228a14273e8031d9
-
Filesize
7KB
MD5c6f7c805723bb7d81bf57f1cb2772d91
SHA1637a70e6b81be9cadfd05928f90abccb070372cc
SHA256dc34375c7f5f926b382b1a0a02e8740073fcb89bd33fa2647ce1e58d4831a155
SHA5125fd1b5d1c19d37542a8c89313e31d745aa33680467a0553d92c56a82ff3da1578f57e9212c5b88e1bfc80c6137e6872d37923cc6b3c683cbff14b5c8fc1bd43c
-
Filesize
24KB
MD51d1c7c7f0b54eb8ba4177f9e91af9dce
SHA12b0f0ceb9a374fec8258679c2a039fbce4aff396
SHA256555c13933eae4e0b0e992713ed8118e2980442f89fbdfb06d3914b607edbbb18
SHA5124c8930fe2c805c54c0076408aba3fbfb08c24566fba9f6a409b5b1308d39c7b26c96717d43223632f1f71d2e9e68a01b43a60031be8f1ca7a541fe0f56f4d9f2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c686f778a3a2817a950e25b0a77197df
SHA1fbc8ce37b2a4f54eadc08f219c0ab22a3bc248dc
SHA2562c899f4577de289e7e2b667a3415eed1a9ebf152e1fd3c5be88898d43ce70853
SHA5124a10d5c06dfe5132e6859b756c8210391846e9850df015f7ca3936de738c274677e134a8b8e015e6b4382f5fd574b8f3452edc47cdef503950b6441d38737da9