Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
85s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2024, 14:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.twitch.tv/max_weqrs
Resource
win11-20240214-en
General
-
Target
https://www.twitch.tv/max_weqrs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1868 msedge.exe 1868 msedge.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 3976 1868 msedge.exe 49 PID 1868 wrote to memory of 3976 1868 msedge.exe 49 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 332 1868 msedge.exe 81 PID 1868 wrote to memory of 1224 1868 msedge.exe 82 PID 1868 wrote to memory of 1224 1868 msedge.exe 82 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83 PID 1868 wrote to memory of 1276 1868 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.twitch.tv/max_weqrs1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9a90a3cb8,0x7ff9a90a3cc8,0x7ff9a90a3cd82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,8504663154763238451,8230770469544261749,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,8504663154763238451,8230770469544261749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,8504663154763238451,8230770469544261749,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,8504663154763238451,8230770469544261749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,8504663154763238451,8230770469544261749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1940,8504663154763238451,8230770469544261749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53ac94e49addbb0b2b78b1cc0c4fdc41a
SHA141dda9076097a81d24a814805f80979eb5736a72
SHA256259e79a3a5696dd704f943a3146b6622715c38d269751ea5b90c4858aeecaec5
SHA5129890dd31736bf96b3669a9ba135e029d02a0245e31795f71f15bdb79066e95f8d43233643a78e1a36780b6983d88a5a82f71a07eb91133d9319c014e935fc9fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD58ea37e12a310131d482e2e57690996ec
SHA15d11b77895b6944acc54970951013ccf7101ceec
SHA256a3854e30edd238258d966c891cf3ae382bbdfd58f45469df60c91930e017bfb8
SHA5125946f014ef4dc55c463262e40651f35175482b5050af1a3abd6b54ff87cb39b2e13c41eca9f3f882499725840be25489454e4be5e6fabdabb4ae071621dd9ef3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize96B
MD5429d154976faea17867f7c7d84e35d96
SHA13852f7d84b71de720586aee59f1cc3a68dd5d095
SHA2563fafa822b511aa5ab340cb48d140494a7b88eb29df45cba4b5178374c7373292
SHA5129ea6ff00ca19c2f7792c78f6d24e6a1d60827b9532b3ee9d2611cc85bd8ba74c64589181d0528b1f96dbfc127b5f311640ebfd3002889590fe749e7ccade790a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.twitch.tv_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
809B
MD5319f4545e711691153f43d63eaf793f4
SHA101a6da0a31e4d38b010e82ea52c370d57b24df55
SHA2562cf71230e2217a6b10ee9d511f335c88d5ed1546c8155df5a5b5ff1be974ea2b
SHA512b5f1a9a776f84c5a845adae5d21e4c6faae6a446be62e3415c47bd4a0bf298cc7ee8be3a3222410d8062cb89ebaa6cc3a3048d7c080909b10038990c2ba74dfc
-
Filesize
5KB
MD5c2a63fc09c26b1e546a4f07c79b75d9e
SHA18b2cddc79cd3670e0ba4b122c47e1f5ec2575146
SHA25605e90fbdd796989a1be777a0ed4743b7886c58af4745473b4fe1eaa11722c234
SHA512c3a81ce1330c81d84759d75a95357d32c336b9f0145a55ee4a96a9d4a1c6f127b8f20a97cf5ac3d4ed447a94f054ae2b18a48e6adc4164199f6584860ea43931
-
Filesize
6KB
MD51b56844d80cf6a467412d70ee538743a
SHA1e07be864b73a6ffe02d334ce546faaa9336a2fb0
SHA2564951ca234cbd9467e54f54a0f9c72cf415468accc57a05f1760c067bb628cab6
SHA512e479974974740ff35b8948ff70e2a940c4cd50ef770aa918397515b38d81e2ce4329c2f6d89be8f4579dea712b8535113cacbc669a20a8539442e83c08c2d24b
-
Filesize
25KB
MD5f47e1b708a6995ba8f891bc84722fd42
SHA1a1438c8d4a02006d6c161139ee482ebe66b6f51c
SHA256662362a16cd5adecfe299a88b2a65ce422ea39b33bfe36c5248d3acc4baabb2c
SHA5124757d77b86dd1b1f50d623f4a7023c6a28404922dc5f978e4ec06c653f636f3bcfca5deed8796b2e47c8c6e464071d149e57ee6d52a5cc57183c6cb85762c74b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5fa60c3b90574a7dbc0c56dad64396980
SHA1ef504709970b176f984d08ef052cd08429c286ed
SHA2569614e045179212c2987a4557f9e253e5822ebced73f24be8cb05f9e9637bbfd8
SHA512004bb6e7bcb6613b6b7c2d9b702f4f500aabb0b99984a1cd5aceaf086b1bb51fe6427e2122995ccbf1ae96a9476fcf471b722972dce714c9bcef76314cb30398
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe576801.TMP
Filesize48B
MD59c471ad5038444d860d71638ed2b6f87
SHA1327000e6e4810104a586555965535ab20fea8ea0
SHA2569f95515a243ca7e4bf9bd6c9ea1ba04bd31b1d791b77c7be190919f408d44f3f
SHA5127553b1c3b438d89b085156bfdec63bd2b37a31d9d2cafd377e6e6218d744f87306a20af79779e5cb0e1bb9f7b77385bd217c0ac70f521e35bf844f04da487862
-
Filesize
10KB
MD54ccc7639a8601bf0e2fb10dd03b1aecf
SHA1bc164b67661167efa4e9a8f9baae25830d22445d
SHA256a250e62df5e4fd01141ca93c8ebe0a16a4d098a851626f0618860ded88dfb1b9
SHA5123dccd1986fc8462338a241c2e0b8c33dcd8b6eed799ab955066378740f0fb9fb407b71a7abd52e0e11b20dcb22ace78c54077e2f6d7eaa048073f1dc3220b9b3