Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 02:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://openai.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://openai.com
Resource
win10v2004-20231215-en
General
-
Target
https://openai.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 4116 msedge.exe 4116 msedge.exe 5520 identity_helper.exe 5520 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe 4116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4116 wrote to memory of 2228 4116 msedge.exe 84 PID 4116 wrote to memory of 2228 4116 msedge.exe 84 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 64 4116 msedge.exe 85 PID 4116 wrote to memory of 1804 4116 msedge.exe 86 PID 4116 wrote to memory of 1804 4116 msedge.exe 86 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89 PID 4116 wrote to memory of 1888 4116 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://openai.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ccd546f8,0x7ff8ccd54708,0x7ff8ccd547182⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2596 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18098272917077109649,2506467473351191406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:5572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD52d73cd3187650c0151c91bdbc3b56344
SHA1c18b48b6011c25ecdae70ff135924b1da433fc38
SHA25658aac095a8bcbc99c615c6319f13321f939f358f1f5d9278a6eccf02c27042d5
SHA512d35e9bfcb511cdc4a40f066df75750a29756198f7e0000873cb3f9bd031ac8e3b21335f612a75918bf5e30f88ca701bd87916c6ad6375f1bf3c46f51a2fa7c1c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD563865c75f4b33c119ca232dbb726a458
SHA19c38f090041e528150edcc525faae8303cb8857d
SHA256df4161a3b0a64c647de141545c36b424049125646531f7bafb072925d05164a1
SHA51213e535145a561ae796ed7cfc0f1fa2c6e3f600f731a9777c9d81a1f1bf953d2b0c80435c955657d3f86a227390416e02f77c69fe15a9d86b584d86487026d188
-
Filesize
5KB
MD5bd43ab1bc47dd025a408ca2f36c103ee
SHA1aa745da67e70ea31e9e5077d0bfeb79a487384cb
SHA256c145ec4cc3fb2ee71d3360521072bce2492d83e26cef14023efc4c2ae0d8d228
SHA51219c6747cf170b0c3490f31ca3181b037c7c173abac2378c423a0451ae0b9fa376b31fd9068c54f996edccb4c5ed1993de49c8de44860fb7f25f46544c9f8f8a0
-
Filesize
6KB
MD54f02253dc0d4ff82930d00bbf85a340f
SHA15fe713b90dfa63b8c7acde473cd00643b21b9335
SHA25660a08418adbd0e5fada7ab6468c2e89e050a7d9b35893fe13b3ae126ee678cf4
SHA512697a9337ae11f143dce700667ae1959e7fb6dc1f218c8bb6929527b6447f1c78ead829c26e70d800220aad42b372e0a644705fc1b209f89a6f19c507bb04b6df
-
Filesize
5KB
MD574bae7012a7fede9baa5dd676c769492
SHA1eee682ebbc6357406f44bf0f93f9ee27bad44809
SHA256d37598d59225eaafe640c9797d8ddc4f96da54377cb63c120e332077976eb6fb
SHA512aeb57a25500cde4d2bd4c8982d95cc651bac7deb55ca9a66b0383c67a1d8a02bc97528dd1cb2797ef2bc4eae6cbca04c6553aa86e41e75ee8789d8cc97bc76b5
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50f337b77efde10832fedf7b478fd29fb
SHA1b7557c37543035bf4614970301553076a22ec83b
SHA256cd4bd4beaff02fad31ce27335725fc19f55e56b3c607607208582122b7e0cb4b
SHA51277f8753ddd791ae9f65dc1f6ca5c7382feda93f2e36e25411f7047b53104d20bd85b13a24e93e03b85b1a312b4bc124b377d4b874b31b899bcf956e2e1b909e0
-
Filesize
10KB
MD5c697d156032e00b3724f96009087f5b0
SHA18cc40294abea0d037ab9da0a2ab0043b4e9fe018
SHA256e81f40cb59fc43277f5f5a9c72b30a54c8ad48d46e26af079847243354635e91
SHA51266470dbfad14c341fb2f669a2aad259aafba23e8ed502587fb4fb1aa0d697f03a04407ab5d583d1109763e15f545edcb43d9cfd0fb602fb469241c7e338b879e