Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 11:31
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tap-rt-prod1-t.campaign.adobe.com/r/?id=h9ecb88b,c1e96b3,69fe0fb&p1=0mc.yfzjb23.ru/oYT0o90oqx/#[email protected]
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://tap-rt-prod1-t.campaign.adobe.com/r/?id=h9ecb88b,c1e96b3,69fe0fb&p1=0mc.yfzjb23.ru/oYT0o90oqx/#[email protected]
Resource
win10v2004-20231222-en
General
-
Target
http://tap-rt-prod1-t.campaign.adobe.com/r/?id=h9ecb88b,c1e96b3,69fe0fb&p1=0mc.yfzjb23.ru/oYT0o90oqx/#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 216 msedge.exe 216 msedge.exe 3352 identity_helper.exe 3352 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 740 216 msedge.exe 85 PID 216 wrote to memory of 740 216 msedge.exe 85 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 3608 216 msedge.exe 86 PID 216 wrote to memory of 4332 216 msedge.exe 87 PID 216 wrote to memory of 4332 216 msedge.exe 87 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88 PID 216 wrote to memory of 1992 216 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://tap-rt-prod1-t.campaign.adobe.com/r/?id=h9ecb88b,c1e96b3,69fe0fb&p1=0mc.yfzjb23.ru/oYT0o90oqx/#[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc14b46f8,0x7ffbc14b4708,0x7ffbc14b47182⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16619155104302509855,8998229812625566128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:3284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6246dc53-f39f-4106-a412-594d5e024b09.tmp
Filesize5KB
MD51b765bb45a18966bf74a6310f95d4542
SHA190df10edddf3463d74a53a1173183e0da06df207
SHA256184e081f4da0c9b91182516419bb04771ecd59747f0d2b4f69a3228cf02c453f
SHA51223cf1d1672cd9350cdf648be96204718f44829ff514fee0207b4ce6f485f6c86b43261422b77ab43d6902e61b746f5b2c25b7b17c5051aefaf39aa40904cfee1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD596eff793355e17fc252c9188b54af705
SHA154e400b7cc20433356cc6790d126f8f444a52214
SHA256fe1a959dd41f82450dd1087970e6a5ae0a1b50e7c1949e85af075238130cbdbc
SHA512cc832e86405a57b31224330b93baa366d04822d5c07ff9a0012a6f384ee6324dcbeca55a5c0a686515d3d395087498402f55b8743b281c5168668878a6a70357
-
Filesize
5KB
MD505dd64d58d8a0574c8c30983f83539ab
SHA11e26ce3bf07d934d70c7edf8e7a5cc7855443112
SHA256d7fd1a0ee07324b260ece20be5b884246a02d1349a02ea712221a39c6e680844
SHA512c0ced74ff7f37fc86339b090e97dc5e3afeab1598900053f7e5ad7753d115010f5a92b9e3874c959e372b2e8498da3f325a234ecb7f4e60dce4a20d2b4d43969
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c8073c18c507cea0648a19992860c2b7
SHA1905315aa11e2b89c70bd5c6c2c01139cd3e76dab
SHA2564ab532424041135f261945501897970508c12884e73363e4ce0c4ba16608b905
SHA512222cfeb64df2df7653e3217b9943f04f0479f14534ba2b3fb6f90036e7a0363f51ddc38c77401f0f8f43822d56580cc014725bc9d3e87bad18737acb073e1a48