Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 21:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://workspace.google.com/
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
https://workspace.google.com/
Resource
win11-20231215-en
General
-
Target
https://workspace.google.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1724 msedge.exe 1724 msedge.exe 1680 identity_helper.exe 1680 identity_helper.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1856 1724 msedge.exe 78 PID 1724 wrote to memory of 1856 1724 msedge.exe 78 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 3676 1724 msedge.exe 89 PID 1724 wrote to memory of 1848 1724 msedge.exe 90 PID 1724 wrote to memory of 1848 1724 msedge.exe 90 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91 PID 1724 wrote to memory of 1044 1724 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://workspace.google.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda0ec46f8,0x7ffda0ec4708,0x7ffda0ec47182⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12326319540569400201,2639472041484162985,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
Filesize
201KB
MD5e3038f6bc551682771347013cf7e4e4f
SHA1f4593aba87d0a96d6f91f0e59464d7d4c74ed77e
SHA2566a55e169bc14e97dfcd7352b9bc4b834da37dd1e561282d8f2cc1dbf9964d29a
SHA5124bee876cea29ad19e6c41d57b3b7228f05f33f422e007dc1a8288fd1a207deb882c2789422e255a76c5bf21544f475689e7192b9a8a80dc2e87c94ee0bc6d75f
-
Filesize
473KB
MD5db012648feb1b675c843197068b96354
SHA1f9298331818bddede58c6cbcb651709d2a4e95c3
SHA256bc0adb7357c17f3e561bcafbba6041d87eb4cab39a3c45a3b9bb4dd112a08d0c
SHA5120f4a07033ab14a7063e6dc3d1efc4974d89361224444eb57e8bb3ca7404e78bb9e6661440be949b59d79761ca4823aa7174ecd78d69674b6d45a5b6f35e67db4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize888B
MD5fb8f6fa29feaa8998074ec944378dae5
SHA1dff267763a8e3fa81b6323d8b15f3687f0b647eb
SHA256abe2d7342e379557e2c3e6d6a76fc276f6c356af0a6a94ad302d485624a3278b
SHA5125bfcb7aae169b917e9c06b3cf6d2062268277e45024859958faed53e00d68ca166b0f26c643b538bde7dab0037ad246f9f70c65bd26f14c31ad7ee2c53bc2a04
-
Filesize
4KB
MD562090ae3577a34816ac5c7039bfb3231
SHA1d5d81eb1e31f304329e8ae1a4885539d1adf3976
SHA25624b1f15a989c9426ffa14fcd6f5b4ed712f57a30b7a10f13e0646c4892cdde24
SHA51222b69f9a78876c57e5bb3b6e05cbf50789a87f7cd7dabb8413e83af3218efdee47383baea1f7c144c76fd31f76ef2590465593d57942dde80ad182394731dcfc
-
Filesize
5KB
MD547e385379c222b60680691f3dda8fa30
SHA19375a4042cff01e7313aea2baebe5e966c6a9f79
SHA256f5c0abf46465e1e300c9c0712ffc705760faf436b02c8981e98d5bdf6cc78fd7
SHA5123de573004636cee39439aaae0a34f0423bb6797b8bf97acd04aa94ca70c5d56b8ff5f931f9c92b56bb7d4004ef8b07b651ed5cb01db197d7b92d91b566d4e53a
-
Filesize
6KB
MD5526daa7a6abea4a77ff9ffa88a589f71
SHA1260d5fd18488415fe962516f4ecdd266ee7e283f
SHA256d4546063f820a1b361955a005a27e3b4dc2496b4ba3205a7d3866b11bf8a8755
SHA512cff5dd249f8429dfd530e5ef1f84bfd9bf5ea194e502c188cd2a31decdb27d301dd40a8284f6a52332a017f7e4bdacca4b1bbf8c6380ea855a2e087d7c49beb4
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f37f3412-860f-4859-8b83-ea2c3fd8d76d.tmp
Filesize6KB
MD5a9da7e6b96b01453f2a1b23cff707a19
SHA1620379a333e342e1ea3648f8bde691cb3a3a4e43
SHA256c6b08e2c0a3cfb480126216ab60ffed747fde524cc163e4b0c046492c971b994
SHA5120a5e44a28a8cdb166e9ec5c2e3e8e5c0e15796ef26af4ac32635bf620ade1fdd80e9d162ff38d09d7f73cac037277623894f2e3d6c59a410a7c4bf6f901be8a5
-
Filesize
10KB
MD563bd6ac61e3c18ccb298cc2a2dcabace
SHA16cbcc9f07843a791fa80581dac736c86ea75124f
SHA2561a66deb05b6578bf62079e927f1255d5e3c1636a41bdcdaa15bcc737ecea9e7e
SHA512735f3cc16ff1fc377872378092a3a0ecd804d1db9fcb5ddbfe223eb9984139f987f8edfada257f70c184f99aaa2186d3ac8ac4252a408ed74454bdb8bad2d039