Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 18:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.flowcode.com/page/330th.westregion?utm_term=VNzrlfDiG
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.flowcode.com/page/330th.westregion?utm_term=VNzrlfDiG
Resource
win10v2004-20231215-en
General
-
Target
https://www.flowcode.com/page/330th.westregion?utm_term=VNzrlfDiG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4628 msedge.exe 4628 msedge.exe 1856 msedge.exe 1856 msedge.exe 4544 identity_helper.exe 4544 identity_helper.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4588 1856 msedge.exe 86 PID 1856 wrote to memory of 4588 1856 msedge.exe 86 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4380 1856 msedge.exe 89 PID 1856 wrote to memory of 4628 1856 msedge.exe 88 PID 1856 wrote to memory of 4628 1856 msedge.exe 88 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90 PID 1856 wrote to memory of 4952 1856 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.flowcode.com/page/330th.westregion?utm_term=VNzrlfDiG1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c6af46f8,0x7ff9c6af4708,0x7ff9c6af47182⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14696754699424285085,4888174101738126412,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
Filesize
36KB
MD5b212a798db3b717b02ca67e3ca5c0bef
SHA18f664bbee4804fedcc4293b697aa191b1f9a166e
SHA256f6789b1579e3915acc50ce2f56d956c05dc3186238eb4d1a0d4ad1e403a625ac
SHA5128c3e14a372bbbd1eb59ec1b0e82249cbebb6db1d9e75f6aff2e51dbd1bdefc44aef96cc98259c7a33a762465fc8b409baadac993f1c69c60013f7c75a5ce488a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD56ff4363add24cd610bfda292633f86ab
SHA11076dd0603c9515046019cdba239b61db2d13796
SHA256a2e9a03edab6b5079eaf182e0e70b670a844bae09c3ecc6f3937408a24bc9093
SHA512826501d772f624a6ad49b73f92d344d7b68cfb2686341e64cc115bb50df68d4b2be0903d17047f8f8325ec1d8141b78d10db261869827b452f4a4c6ae4b9e062
-
Filesize
1KB
MD5852842b301bbe6a8e4fe7613d0a9f54d
SHA1f7c0290121e8d195bb98650ccc1759f4fa83c2d4
SHA256bde871a2a8b319ebbb89a7a204773dab33d713c3a3e7364084329776bf81b5a1
SHA51228f4328d04c1da67327212ec187e4f5a580016cc1c9adc2664afa485c3f344ec648b0176fe361900f30728036dfe640e04308f157b2fb7be654b0ee518a27ab7
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD580fa56da5628e7008477b5919903a31e
SHA1813623f973d9f5ebd79672e230aa8dcad2156a3b
SHA256e80bfa6a1cc2c923da2e99e770bcb4decd44f3939a9d824926e0a6d96c7ed9d4
SHA512bc84dfb10614bf9de5dee304c22e2e72f5cc786b5157af0130ab7ea33098a94e4f73e7c1e8cbc6554374a86a9c6308af6a7ae2db707c8bfcb939069bea7ec624
-
Filesize
5KB
MD50f3dba137a75be6f05f74ee9446d7825
SHA10b397d484fff2971f95c674ac093099ec959161e
SHA256cf9dd8f3ae91588fed8a36a959b6a11b4a89520ff21c940e214eb12c2618122f
SHA512fdeb9307c7f4f6e4930c2964ef765f5d5461bed78e775a7798452630be85eb2c762550523e406f219cfc8d18d8277df7f3ea55b2cb3114b12eb6bcb8421bf5c1
-
Filesize
5KB
MD5454d2e09cbbfaadf0a3063eeed54a7a2
SHA1dcbea9fbfb1a05116711f696d6f99dde8780e69a
SHA2567d47677bf1c619f79aa62df416cd43723eaf1d46734e6b7081c5665abff2d605
SHA51251bbcfc75cada217fac5b25c6306ce67e822407344e1e7cd66ad8a5ed653890fbf6362183e6de6be25359330705507c6396ec1d114a9f63c7a8b16334cdf62e4
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56479c4a50c3551c90f6a228e279e14b3
SHA1ea86084e3be651377286e20cbb02f2aa00fac9e6
SHA25650644412196126e9f0e431965c9b5e8dfd01e141763c650f6b41439ee6ec01ba
SHA51265eaf3eeb778b9d76cc99d725fdecb83fa6854a2d8a06c7635fa34dd1911ac9f2b3b34ff3f7b4ba43cc5e690897a39e08ab0713269f3bc015d5bfa0a4fa53932