Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
480s -
max time network
484s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 21:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://example.com
Resource
win10v2004-20240220-en
General
-
Target
https://example.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe 548 msedge.exe 548 msedge.exe 1428 identity_helper.exe 1428 identity_helper.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 548 wrote to memory of 1356 548 msedge.exe 33 PID 548 wrote to memory of 1356 548 msedge.exe 33 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 1292 548 msedge.exe 84 PID 548 wrote to memory of 2548 548 msedge.exe 85 PID 548 wrote to memory of 2548 548 msedge.exe 85 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86 PID 548 wrote to memory of 1688 548 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://example.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe717b46f8,0x7ffe717b4708,0x7ffe717b47182⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6964817149272578513,17966187107730238276,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ebd667e8db80b0ab07f02f3dc844252
SHA1461bade20eebf59e30e8c3620640d6df6db79249
SHA256d04531e41d70e7832898e797081335b3f0314b09141a01de921ff679dba41b0f
SHA51275f92d1f4ab942c3fdd3b70542956ea246f718aa8808a53f33d52278505f4f783e4c0458e5093ea4f459e72faea431f926373883eed2ec7da1109bd7efc6fb57
-
Filesize
152B
MD5f621c7614503377ba83f2fcfca1c303b
SHA1c7ec737f8e0262052e038691e5b38db37bdfe56e
SHA256c2d2e04acc5e2cd129dd3211f73b498043051b74a2f661c1199224b37b681b26
SHA512203e5e582007efb7d11b0442e85d4e37a4cc1332bd6367cd74b0d4b9de0d0df85757bdc66474f62309bf530841ab7a5e4c0d43c95aa416b7175129e2e2b36c26
-
Filesize
179B
MD5eafb3b56ce7e0c625bd750f3f087d487
SHA1fa475e03ebb6dfc0057c08ad0a8153610ab1197c
SHA256eb28e874edeb410fa45309f8ff5e3543cdf138f5e2ee1369fca43cb39d85450b
SHA512a9f045bff19927ec8018822b7805811299bcdd4f7dfcefcf19e7a8306436a1243b0fc27a719cacd0f126c929ba39ca13c43a0b7cf386480d0de41d4b10e4e1e5
-
Filesize
6KB
MD5e87a22381041e638c0a18a4b8e041392
SHA1190b1ee669d19e3e9a7055fc52d735d1178e18cb
SHA2569a3164dac3e16321ae91b839af5df43ea80be2c8f30690f5395d623d647a7775
SHA5128801d5553c39cc80770edb25eb256ec70eb82a8df7e339bb73985928f311a93bfb762808a54f0e18f57d84100901e03f91473e4650cfaf8736fe71b1b0ab6ed1
-
Filesize
6KB
MD509b0820d0b7b07073fa5084d8146e961
SHA196ac3ea3fcdf56ff441fcb9a4f9e08086adf806d
SHA256c1c24c55bf5661fde5d8889378cf02f1a4db6e81bab192db1af61dafedd154d4
SHA5127719f5f8997e206c499977a2c81ef76817e6140702bb4ad8e83dc4869b902a272ade815bf4c1a1238c885ae01e3f67be87c9bea782095f06ae781b1e926ef0e5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b84e3fe0720dcf99e324769803c9eb6e
SHA119b22d4e6a4e6dcb653d9d7c4928fefed0b42465
SHA2564726fb560cb8a01f34e71117a4669181255b7115e7d5067eef72e0405b978c3b
SHA512d77ca0703f3cf2bb5b9e132c182161555839024434e471aecd719f16e9dc29869852393ac3478b1198f6364e1600425e5a210876c71fe5b300a05a3509a9f995