Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
107s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 16:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dl.google.com/tag/s/appguid=%7b8a69d345-d564-463c-aff1-a69d9e530f96%7d&iid=%7b89452841-ba15-556f-1798-31dea9c06ea4%7d&lang=en&browser=5&usagestats=0&appname=google%20chrome&needsadmin=true&ap=x64-stable-statsdef_0&brand=gcea/dl/chrome/install/googlechromestandaloneenterprise64.msi'
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://dl.google.com/tag/s/appguid=%7b8a69d345-d564-463c-aff1-a69d9e530f96%7d&iid=%7b89452841-ba15-556f-1798-31dea9c06ea4%7d&lang=en&browser=5&usagestats=0&appname=google%20chrome&needsadmin=true&ap=x64-stable-statsdef_0&brand=gcea/dl/chrome/install/googlechromestandaloneenterprise64.msi'
Resource
win10v2004-20231215-en
General
-
Target
https://dl.google.com/tag/s/appguid=%7b8a69d345-d564-463c-aff1-a69d9e530f96%7d&iid=%7b89452841-ba15-556f-1798-31dea9c06ea4%7d&lang=en&browser=5&usagestats=0&appname=google%20chrome&needsadmin=true&ap=x64-stable-statsdef_0&brand=gcea/dl/chrome/install/googlechromestandaloneenterprise64.msi'
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4848 msedge.exe 4848 msedge.exe 4136 identity_helper.exe 4136 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 2392 4848 msedge.exe 15 PID 4848 wrote to memory of 2392 4848 msedge.exe 15 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4992 4848 msedge.exe 51 PID 4848 wrote to memory of 4684 4848 msedge.exe 50 PID 4848 wrote to memory of 4684 4848 msedge.exe 50 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49 PID 4848 wrote to memory of 228 4848 msedge.exe 49
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ba8846f8,0x7ff8ba884708,0x7ff8ba8847181⤵PID:2392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dl.google.com/tag/s/appguid=%7b8a69d345-d564-463c-aff1-a69d9e530f96%7d&iid=%7b89452841-ba15-556f-1798-31dea9c06ea4%7d&lang=en&browser=5&usagestats=0&appname=google%20chrome&needsadmin=true&ap=x64-stable-statsdef_0&brand=gcea/dl/chrome/install/googlechromestandaloneenterprise64.msi'1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5235322169472065832,12239991196510280848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
Filesize
585B
MD5e28628698710bd527944be388e711fa4
SHA1b237e238bc4e256ce0e458bc955c387124e4e359
SHA256a8ec404fea69899aa09f3e2db5ca3fe8f87cc4fd84efc0721b3bb2b31e5b2a95
SHA51224c5d2095c460d77dba62a8bc727507b368709be04e385d781d39d9ba34b16fa8a5b64cb9929e8770c1ce03a70302968938cb61628d7dc97da895914110ae014
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5335db2a96989b96fb94a76d79e950233
SHA17416763cf6e4ac9210ccaf0099b8fe8270069796
SHA256322d886f185279f405ffd6d372a92d684442eced98551506e5130f788bb9ad85
SHA512bb039ecd590f09e6f117766330871a7443aa5e6f93739f827b3be18c62d71a4eb42f5306c15f754d84b5ad943f80f8d6ba08d5515e1924b9cc1ae6a169da299a
-
Filesize
5KB
MD5297c0124acc3b7fd6bf080cc7785cd55
SHA18561ce24dcf3bc62379ffb36fb890cb46fee1bd9
SHA2562ab586a9d9de94e9d4e6df50e16ce97f580307b8a0c95cb303e924b8859b4676
SHA5124201423fa4355e28767e0ba0f34e1a6461a70cc782fda27a09c35ab7fd4cc1b2e3213d4901504b6201b79ec2104549541266cce9cc30e6395f58912054e045ff
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD560fa20d93620ddee7b996bc9d5817dde
SHA1b4ae51c9083c992ac87895a15fbfc13b5e36a055
SHA256dd3806c9884ed5fbcd940bdb552e6482bc9e28418a502dd74dba62a7c5174800
SHA51296a6c65ab107ba1233ee04f2a7ad0f06d66c5ec980dd21d4a3e1ea8242af2b7ac77709c278b0c84dd3ee9bd577c7c74c2cdab0b6c39955fc19758953aa4ff9eb