Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 07:07
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mu0c804bsib2-1323563947.cos.ap-seoul.myqcloud.com/mu0c804bsib2.html?e=#[email protected]
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://mu0c804bsib2-1323563947.cos.ap-seoul.myqcloud.com/mu0c804bsib2.html?e=#[email protected]
Resource
win10v2004-20231215-en
General
-
Target
https://mu0c804bsib2-1323563947.cos.ap-seoul.myqcloud.com/mu0c804bsib2.html?e=#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 3932 msedge.exe 3932 msedge.exe 3496 identity_helper.exe 3496 identity_helper.exe 2008 msedge.exe 2008 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3932 wrote to memory of 4116 3932 msedge.exe 88 PID 3932 wrote to memory of 4116 3932 msedge.exe 88 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 2956 3932 msedge.exe 92 PID 3932 wrote to memory of 4784 3932 msedge.exe 90 PID 3932 wrote to memory of 4784 3932 msedge.exe 90 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91 PID 3932 wrote to memory of 1980 3932 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mu0c804bsib2-1323563947.cos.ap-seoul.myqcloud.com/mu0c804bsib2.html?e=#[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc871446f8,0x7ffc87144708,0x7ffc871447182⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15236080569974472680,16564814551015348715,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5011193d03a2492ca44f9a78bdfb8caa5
SHA171c9ead344657b55b635898851385b5de45c7604
SHA256d21f642fdbc0f194081ffdd6a3d51b2781daef229ae6ba54c336156825b247a0
SHA512239c7d603721c694b7902996ba576c9d56acddca4e2e7bbe500039d26d0c6edafbbdc2d9f326f01d71e162872d6ff3247366481828e0659703507878ed3dd210
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5816c66cca388c763e790f9532a4a7338
SHA12f4a1cf7b96ac82b33d8422e94d573714b6e3faa
SHA2567300d4c65f8cffed1bdb31043f4bcc8193e9be74cbe50c10d66d096e978cbbdc
SHA512063fe2e49e08a4ffb94d9c14a27434126096e8a03aa86eee40aa93117158d91089c90ed3e778f972f6587cb2f62ffb1b4a81e3b1b3e362d776bcc9168fb87f7a
-
Filesize
5KB
MD5ac45478b6610adca14bea888167e2495
SHA1d52dda10ad712c1fd02bf622d163998880e20027
SHA256149553c807991a17fe28de963e2e5fa20ef66bfe1bfed7aae24249d3c2247f7c
SHA512e4aa0716127f6204199bcb55d6fd60a0eb828e38811c0c4b85e8eef67b3aceaecc70d946ffcd7c13b0847a68133fa05f45ed77eb58d63ebdd5a8cbc59d4d47c2
-
Filesize
5KB
MD5927fae3009348b0ab389113c90daaf15
SHA10cedb60e4d63c07850cfa3322e86092e1fe1d5c2
SHA25689d76efb9343bd4d8b22dcf3a697f61e412c6a86e83ef8d207e45eee5ec2378b
SHA5122208270e7a7a3fcab1b523f5abcb4fa760609b22a9085cca12a129363992b6546c1d97cdfce3e5889bef3e14f7fbd62c7b476226fdc2b6cc964bc8be068a1b91
-
Filesize
24KB
MD5f5b764fa779a5880b1fbe26496fe2448
SHA1aa46339e9208e7218fb66b15e62324eb1c0722e8
SHA25697de05bd79a3fd624c0d06f4cb63c244b20a035308ab249a5ef3e503a9338f3d
SHA5125bfc27e6164bcd0e42cd9aec04ba6bf3a82113ba4ad85aa5d34a550266e20ea6a6e55550ae669af4c2091319e505e1309d27b7c50269c157da0f004d246fe745
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a7f970d4d99f1f2b3e266c1f9575b610
SHA1a690ed98751a0d28c9d671dc19386898d064a507
SHA256de8f8059ccc757073db05df1f20bc897445b8836243f6374716fea21b0eb627e
SHA5129bc7f772825a198eaa6b430f632b383de440d66ba76d0a03282569105fb3d76be6f01368a0c4a3f78e2b34c6ab29d01f4ad9b63fc9362e3d3a0e89f41949e66c
-
Filesize
10KB
MD5926fbe38a2a0eaee9d37cfb337ec5ce5
SHA11ad920d321f407a097387269ef79d3665eb79c61
SHA2568cc0dff5b1490a33659023f68d707c5c0c5d8fb21b480aad86b8a3a5028cdaaf
SHA5122d57df4ad58a12ca763ecfc32f279f453960fda17483273d9fec2fcb6a871d8641a5f8b0e7890d01e00a1d589675fc72a374b787ba68b6e9104e9ac2aa89aef0