Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 23:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://trustaged.trustaged.us/?Iqhus=8n1om
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://trustaged.trustaged.us/?Iqhus=8n1om
Resource
win10v2004-20231222-en
General
-
Target
https://trustaged.trustaged.us/?Iqhus=8n1om
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1936 msedge.exe 1936 msedge.exe 5036 identity_helper.exe 5036 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 3552 1936 msedge.exe 65 PID 1936 wrote to memory of 3552 1936 msedge.exe 65 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 5748 1936 msedge.exe 88 PID 1936 wrote to memory of 1396 1936 msedge.exe 90 PID 1936 wrote to memory of 1396 1936 msedge.exe 90 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89 PID 1936 wrote to memory of 2356 1936 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://trustaged.trustaged.us/?Iqhus=8n1om1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc458346f8,0x7ffc45834708,0x7ffc458347182⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:5628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8612971635433797150,7077706967184095127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5ad2ff47fd94a8bb264eb36100a9388e3
SHA1a4d9a00570ac5d8e860d481fca54328566e0c3e7
SHA2562aeaedd2e9dfcf99f1ce5f1a366bf8bdd85419986ded0d10d31dc945632932dc
SHA512dc39ed2262212d2fa515481cb453ad4557a009abac1b8cf8a8cd650285cc8af8d780b669612736bd6a7415a9d2e384cff3bbe0f58a6f0a6127c9878bcdaddef6
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD55f7ab49f9a46c656192df8fb8cfb6ee5
SHA136a27a1d6941154ea268cafb32aa4057bd29b00a
SHA2569314404214268a3c4c6089b1ebb704acc313d238f7b7deb2b652f077421289b0
SHA512a1abe14c235f0841521cf457cf46fc1cdb8807d91967a6b22253f36b61d96ca26722b4e6b4bc16095b8e0c414889b7f0e098e8453971dedc63b5f87baeca067d
-
Filesize
5KB
MD53de1e39e11a1f8da49748c823603798e
SHA182a5ac1cf4b74f1784e312d614b00e2d83f72489
SHA256cc25e36c1bf2b1f39b301998b9cc97a464c0df5e5140a6be6d9fbb6c09526bf5
SHA512fb7ac02369108d9c62b334a6f83f281f1237f92a1cec89d9dfc7ee6b2ec883431cf3ca91e537c03f0f4a7479ac2a5508b1f673efed8517f55d0fc9c46336ed05
-
Filesize
5KB
MD5757f40fcdf712a6ec6724be4d18d3f01
SHA19e6499d157e2692793753495018dbfbaa6737f9a
SHA2569c5e66c057cb8ecc960ea99e3556b35d2d9810928512554185b165ffb1839450
SHA512ed42e34275b57594621e126134b1d5855d5198d0045d2b6b100aa9ecc82e7f650dc259209db38705271bbd63d9c0815117c23373ef4e8c4748304074cc944b4c
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5290a80ef58c0755b26859f605bbd30f5
SHA1b22767641358d18b17ab3f8d97c2474de92bd748
SHA256c614647f16fb9b0797ef57bd3de486e3b0212fca6c46cc06ef64e2926ef40269
SHA512a376bee5f095435e97a8bb00e1eb42f9912db1b4c1e955a97b8a5012eb9b3c13142b8450f8c6f79d299973e6f988cc642bea561f5597aabf8e4eef9b51ebbdad