Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 23:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://docusign-review.biz
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://docusign-review.biz
Resource
win10v2004-20231222-en
General
-
Target
http://docusign-review.biz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 2584 msedge.exe 2584 msedge.exe 2344 identity_helper.exe 2344 identity_helper.exe 5960 msedge.exe 5960 msedge.exe 5960 msedge.exe 5960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2480 2584 msedge.exe 15 PID 2584 wrote to memory of 2480 2584 msedge.exe 15 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 2576 2584 msedge.exe 29 PID 2584 wrote to memory of 4032 2584 msedge.exe 22 PID 2584 wrote to memory of 4032 2584 msedge.exe 22 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21 PID 2584 wrote to memory of 3872 2584 msedge.exe 21
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8465046f8,0x7ff846504708,0x7ff8465047181⤵PID:2480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://docusign-review.biz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2512 /prefetch:82⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16834496784678754029,13892086693529122659,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD52e79c6c609d5bf3cea60ecd093da56ee
SHA13fa555c2f4d02de45a65e57af79c4febe1278611
SHA25669f15d761dcf182e72b2b937e180a64943ab0f67081c058017ec4a32c2cfd0d9
SHA512b9b1bae4c2e84198b870935f980f0cd36c7354ca4da56a6a2f5e90b7c071c00220cc46d1966c4b4c6150f04499b1ae60ff5b6eaece67f01a8f7797c7e85dd445
-
Filesize
263B
MD5162bd5ab54d9c82d03838e3a0e64f5f7
SHA13f7726413257b40cecd081b21ea77dea34147566
SHA2562cc52b13b885b85b2559c48d526d1eb4f71b9fb48a9969b5cdeca3360bd95cff
SHA512e31fac204f8ccf9d024d4167cce4b4dd4bd090ee794cc93c430be214a3d347850fea9572e5ba221a5c202c1e7f9ab5ea0cce72e837acecc84688d1f90586f996
-
Filesize
5KB
MD5e34fbf7753691304530e948f8b84789f
SHA19a719b8e9163fcd9d42792636b9186601066f131
SHA256f53b6dfac4864c82a24bc312337cf7fe8b5f69f3544f4d679f79ff9a358e14eb
SHA51287d57d8bf1a7a5e3b7e1793fa1e16a481e7962d33e85cab0da3457977b1d75fb170d0f6643ed0a2e1956bfca81c8b96d8f9f40e2dedeaa7f66bcd59404786496
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
11KB
MD5b24eddb8941811bb795269c17aaaffa3
SHA12c44301d19761fbcdb8d3d6cb48526ad73e3eb80
SHA25682f69a155a2c1c6cec4e7c6740313e27a361562993f31e6bbe2c49714c1db27c
SHA51286a96b1442cebb396c3f254627f5e6e97e2ce6d1063c182f48219a2c9e0e109f19898205a09e52fd68a6ea030dec5727791112b01b98006ed2f43dccf170e1cb