Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2024, 12:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://portal.3gpp.org/ChangeRequests.aspx?q=1&specnumber=36.305
Resource
win10v2004-20231215-en
General
-
Target
https://portal.3gpp.org/ChangeRequests.aspx?q=1&specnumber=36.305
Malware Config
Signatures
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 5048 msedge.exe 5048 msedge.exe 1472 identity_helper.exe 1472 identity_helper.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 3920 5048 msedge.exe 83 PID 5048 wrote to memory of 3920 5048 msedge.exe 83 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 3768 5048 msedge.exe 85 PID 5048 wrote to memory of 4804 5048 msedge.exe 84 PID 5048 wrote to memory of 4804 5048 msedge.exe 84 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86 PID 5048 wrote to memory of 3752 5048 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://portal.3gpp.org/ChangeRequests.aspx?q=1&specnumber=36.3051⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3ad246f8,0x7ffc3ad24708,0x7ffc3ad247182⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,7639731997790452027,8497933039355179789,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5011193d03a2492ca44f9a78bdfb8caa5
SHA171c9ead344657b55b635898851385b5de45c7604
SHA256d21f642fdbc0f194081ffdd6a3d51b2781daef229ae6ba54c336156825b247a0
SHA512239c7d603721c694b7902996ba576c9d56acddca4e2e7bbe500039d26d0c6edafbbdc2d9f326f01d71e162872d6ff3247366481828e0659703507878ed3dd210
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6732d800-0b74-4fbe-a375-193ac563ba32.tmp
Filesize5KB
MD512f22598c401ff82307d8b7060210b28
SHA170e2d576a00007ee9b4b1d2970322b9d03709a43
SHA256e8d6f796c6a3b70378db4e347dad0fd27deb5952d833423714d7e12669902865
SHA512524faf69dbdb8116aa872f58f06b8d9fc5c93402c1305e0d017a145284200822c7f2ab7d37d790e0594b8c4dae0059a36dd1b1b6af55239227c8feb5777e0e15
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize984B
MD5fef8b329ce784077bfd4dce43f6ff379
SHA1eb66e96980b271392563d65f615682887ba19da0
SHA2567f16ba28686976d4abd7a7ae5d8cfca957e2759b5c543ff9f3b153f69e45d8f0
SHA5120b266b2196eecd52462d811b51f2cc7cfd0083683aac27a9d063d8cc41de5f4d14ce4308649670407a0d9d6db8e0a774dc5076e1c75d102c67098c51853b900e
-
Filesize
183B
MD50c1c1b5db5178d728c614511049ee8f9
SHA174fdd30ca724637b087493e8e648d4f95b3adad8
SHA256046c24e918073f80f138d4eae5bd9527418a97b99ec6d422e97d1f42dba28618
SHA5120684288bcf409cf71db4c8e5e6ac6552658f9d9705fc6908c9b9968162b2abb665051226859fe4f7762a22137327093f8cfcc26bfd5b17e5ce615f2773534041
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD507c530c133764be454a3bd168356f2e1
SHA1be89fb2f3b6fb40e4df59b527bebc3f1c57c149f
SHA256536a4c5bffa96215d1d18aa6fa05e49fddf9c9f20cd8e7e7e8d2608545a9720e
SHA51212082fc3cfe466200a71775ffccf2ac4d7a0a8198f6d729fdd2be676fb2879201e4a9f0860c4cd3a9a667237937d25ca67c3e42ab9d9358ac00cfb284d307822
-
Filesize
5KB
MD5bbe676691811863aab9871b282d4f10a
SHA1bcb5c85e0e315c3f2dbf2590122fbc802fc7f742
SHA256e13c034ebd95991d5ac084af2e8e27a7c2584ae154d47aa93f3047e3c371290a
SHA5126119a4cc5fea342a2d381d98cd41f8e6a36d103353597c58bbae90d5641bbdcae8dcbe1e9bbc94dda7958b4b0f096b2d0c81252c44b407820006791f3e6e700b
-
Filesize
24KB
MD5f5b764fa779a5880b1fbe26496fe2448
SHA1aa46339e9208e7218fb66b15e62324eb1c0722e8
SHA25697de05bd79a3fd624c0d06f4cb63c244b20a035308ab249a5ef3e503a9338f3d
SHA5125bfc27e6164bcd0e42cd9aec04ba6bf3a82113ba4ad85aa5d34a550266e20ea6a6e55550ae669af4c2091319e505e1309d27b7c50269c157da0f004d246fe745
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e7e622363a0b80ffe268244eb49fe7e5
SHA1380473159541bd6bcd1d391569333a047ee7a47e
SHA25629fc14fd5eaa6d94b80f3dbee9022b6b460915154c42e8aa3287dc5a2331cbe0
SHA51265c04d6c3fe8ab48c473994f75e8f0230fc35c1e9396ef3c09259a4c06c8916d1becbe2d5df90011e5a597443aaf4ddd60d0c30108b0c2a283fff8280be6f169