Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 10:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://soloneba.us16.list-manage.com/track/click?u=b99ee7bf52d0c1a227ad1037c&id=5196fb3fd4&e=0a28b75189
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://soloneba.us16.list-manage.com/track/click?u=b99ee7bf52d0c1a227ad1037c&id=5196fb3fd4&e=0a28b75189
Resource
win10v2004-20231215-en
General
-
Target
https://soloneba.us16.list-manage.com/track/click?u=b99ee7bf52d0c1a227ad1037c&id=5196fb3fd4&e=0a28b75189
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 4872 msedge.exe 4872 msedge.exe 3784 identity_helper.exe 3784 identity_helper.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 1044 4872 msedge.exe 85 PID 4872 wrote to memory of 1044 4872 msedge.exe 85 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 1864 4872 msedge.exe 89 PID 4872 wrote to memory of 2460 4872 msedge.exe 90 PID 4872 wrote to memory of 2460 4872 msedge.exe 90 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91 PID 4872 wrote to memory of 3984 4872 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://soloneba.us16.list-manage.com/track/click?u=b99ee7bf52d0c1a227ad1037c&id=5196fb3fd4&e=0a28b751891⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ff5646f8,0x7ff8ff564708,0x7ff8ff5647182⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15200543781237841127,17821936762759653154,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5f22e861189efda968c780af7610ee419
SHA1b707d52fc5d90b54d0e8d51f829e0076e8feb755
SHA2562071568eeff51d4998523cada346cad097536a65f43fcbb7dcc9a6096ee54e9b
SHA5125f6e66bc31a420598b295337114f471d7dbbe5f73ec5905887d5e7cdb8a24584608b160b3cdcf8eebcf8a8421a440d71ac628471680319d6f2d7065496d61e80
-
Filesize
152B
MD5d5564ccbd62bac229941d2812fc4bfba
SHA10483f8496225a0f2ca0d2151fab40e8f4f61ab6d
SHA256d259ff04090cbde3b87a54554d6e2b8a33ba81e9483acbbe3e6bad15cbde4921
SHA512300cda7933e8af577bdc1b20e6d4279d1e418cdb0571c928b1568bfea3c231ba632ccb67313ae73ddeae5586d85db95caffaedd23e973d437f8496a8c5a15025
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5294e768d5d75a64b2c893b7d1b35e667
SHA1ae2e71e326b954e9cc26a0162b4184412eb2c92e
SHA256ca0243398870e9508a2a8e51c58216e00caf3bd17fd127b7933a7939b7618efe
SHA512f4d2f0abe8a524bbcba7d69922d1cd11b2bab12f7d3fa29d5265a8ffa74bb91b5f34da4718d27d0748b6267bf4cb0257eddfb2e7040677b81212edf541398994
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
794B
MD5f1b5523a6786eccc0c4779e2f87dbbb7
SHA1f15e2be3988ebd2cafec6f16df52eae2f8672e1b
SHA25679eef1e973878b2090212f1c9b4cfefeb13ca5a7da326daf6130ae705338f91e
SHA51283dd0b74734c743c23d1150eb85f1523f574d2921347040b195e95275f5905ddd2143a71f1c78bb0a3b2981899f49a0717da124b65a70f45ca5fe5decd5ac716
-
Filesize
5KB
MD57d567a0b57938d355cbf67077edad00e
SHA19a466dbde5ef65b79fee5f3a0db6a5ae169e0062
SHA256e61f5a5660a8056e6491f9f460fae3de6974216b865618eb4466caba0ba7dad1
SHA512a6a10d7100a2ebabb13d604a200dc2ce278b618ff91fe0c2ecf22c75e1ef30a6519b3c26c411229ab22d397ea052b8652bcf375c4d19341afe13bb23ac4ee8df
-
Filesize
5KB
MD50283c2f7a0dcb7053bca2a1badde4453
SHA190c28ce379c0d146bb8233f9d624a4726cb4be87
SHA2560b9d9e5ce001348f7c3eb1ed064aa69f3d7f3fa9f078798ea8f226ba12cf3b33
SHA51248910cb7a3e76065a0e30fc585483a0e63a6db268a00ebd2c23b629c66f040bf64d0aa6ca87ed5d275e2d43fe340150483a6213f0ef350c925497a1eb8092876
-
Filesize
5KB
MD54f719a74ff98e752851bbff6b2926a20
SHA1237e9fd6c50cbe63aeed80d0e2707f45203d85a8
SHA256775a1f1e1ad4eb8e4e6009431d841b9811115ff9e51bef4bb2ca49939ac87dbd
SHA512ba2259b04cb77bc81042c5adb0a943a1ea088724d39ac9f9d04c46386bd40b41f4353162828d4cc1dcd486ddc39e1c7f1714f6108b239e45bb88706ef2525950
-
Filesize
24KB
MD51d1c7c7f0b54eb8ba4177f9e91af9dce
SHA12b0f0ceb9a374fec8258679c2a039fbce4aff396
SHA256555c13933eae4e0b0e992713ed8118e2980442f89fbdfb06d3914b607edbbb18
SHA5124c8930fe2c805c54c0076408aba3fbfb08c24566fba9f6a409b5b1308d39c7b26c96717d43223632f1f71d2e9e68a01b43a60031be8f1ca7a541fe0f56f4d9f2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56d424fb0ecfd106ccd1c4ff623dbe811
SHA1881e19f2d2226c3ff09deef3844a267f8a31bb1e
SHA25662618055958801b4906c15bec6fcb107d3b747591955b38732f0b31b0960da12
SHA512fcdb479545f303cea109a60c08442657811ca73fd0f4133e9a0a2a6ecbbebf8791bcac6ffd173344c0024698ab444e4007aad012ecb70dfb8697817d5971322e