Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
21s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/01/2024, 13:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://kujx7wnxete4foxy.5tuyqvho71v.ru/
Resource
win11-20231215-en
General
-
Target
https://kujx7wnxete4foxy.5tuyqvho71v.ru/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1400 msedge.exe 1400 msedge.exe 3112 msedge.exe 3112 msedge.exe 2436 identity_helper.exe 2436 identity_helper.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3112 wrote to memory of 5052 3112 msedge.exe 77 PID 3112 wrote to memory of 5052 3112 msedge.exe 77 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 4728 3112 msedge.exe 79 PID 3112 wrote to memory of 1400 3112 msedge.exe 78 PID 3112 wrote to memory of 1400 3112 msedge.exe 78 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80 PID 3112 wrote to memory of 2504 3112 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://kujx7wnxete4foxy.5tuyqvho71v.ru/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff988573cb8,0x7ff988573cc8,0x7ff988573cd82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,16828446725675348317,5659549771318890731,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55cabc17286e25c0ade7a7f050b6e92a6
SHA1c25ab09177ad0da9ee6caf78310236bdc2cba319
SHA2560e75f9140c154297d8f741aea07b90fc1be1b8deb79c3f204148471800e322b6
SHA5120cc35eda0168f51e5e719ba0bfb226c9f5293a6056d47190a23377deb98244f42c62b8416696cdd13b2db6228c1c8a2513cdf6dbb1d4b59f0c1c889d1acee6e8
-
Filesize
559B
MD5569360b2928a46a5b55a706e618a95a5
SHA106de33b6fb711254ca78752133ec7ff6ae8444ab
SHA256385469a5db1402e56790a02849b600bfdcf5e4c09d86a4f089b7e81d41746fea
SHA512b17f5ff7a3ac1fcb0b2f9d78e46bd9a1d8ed6b012fba2401b77c2996dcffb65e6a5646ac167e2cb73fb18665b6fb1d6eb24b84c7d2545b6c4c556ea2a32aa86e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
4KB
MD54f217216362c6d7a0820f975a226acc1
SHA12924d97baa7c981f8ba23346696ed9febf566ceb
SHA2569a5518a30d9f35b655266a684b3a22fd3c7dff470d853b85ecd0bb03e04423ef
SHA5120830abf37d676124ff1431609fcdf0e2364bf3059b4bb2c1d1665e5fcb692747b4e942aace36d8eed7e02be0ce34037ce7c9d8833374b8728eaa5ba0af1bd8ff
-
Filesize
5KB
MD5b2f9862516045255268a8935afb1266d
SHA16eea59b807ed35aedfc7aa2a9a19e3fa76573b25
SHA256a651b282caf6d34a9104974b4e6131b3c4aa2aff958d6b862c59645e96cfaf33
SHA5122c2d947ba796ed7e8d6b9be994258cb8732dbc65610fa8a3d3b93bca726b8d958d1b56afe11cffce304ffe4d21d6a7592b7557c958e02c35e098d6332957a965
-
Filesize
5KB
MD52f76e5dc4ad138272e27637c4065252e
SHA125ce82bdc48ce8532f23cbdc188f66c9e3c02414
SHA256c190a95df067c00ad4d0b08339885cb5d8f1eff9edf1e556a5b44dcdb862751b
SHA5122f606e3e90d572a8c11f3f008b7e2e98fe4044d46d4bad35357a576074ca297fde625c74d324205bdc868ad856d990f6088a5fa5f5c52f7e97dca1d4c45a7e99
-
Filesize
25KB
MD568fe6f34e7d6603a3d2f4c95919f8408
SHA1c7be30582f94d46f05338cc39726f72c9e2fa4cf
SHA2568cba909149b2d3fc45315cf63cdb8fbe42a4b7c614347171ba00aaf859639c1a
SHA51248eac2f55675b01ebeb28680ed9af6dcb9c558f76fd647cf05f8a7e1fa04ee57f7a8c70bc0ea882bdbca48b29d62ea7af74b76a03b09c19762e4c93118929be1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cdae10bfb9353c16320b21427de14bdc
SHA1b5d555163c720b4711766cacfe879c030b4b134e
SHA2568cff463194d5d6ad5819b6827b1286c7ee582d6803f01ee2717a95880feb159c
SHA51209e43a32cda47e65a91c3372caa27239829bf32431aff17b5d3ab6ce026efa2698f0652099ae2a7ba197d5772bcd2e8213595af7af14bd51a05e77f627b73566
-
Filesize
10KB
MD54d76d9897aca7f27424a0190bedbd62a
SHA1a5b1cb2582f7302c478ba72259b403d6e3102b20
SHA25657fb7236250524f3d00c64a4c6af2dc1a0328e413dda445b87ad6dbfb976cb91
SHA512cc10be6ac41b2694d05ef7eda0463ff4761c71ca5a028fb5a2d8b00c3782f3c478b709f5f1951ae50b86a2d8590a7c475aff548c0cf6493c9df1e3aeedcdaef3