Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 13:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://click.vipcapitalfunding.com/click/gjyh-8srkl-bx1x8-brqvcq8/
Resource
win10v2004-20231215-en
General
-
Target
http://click.vipcapitalfunding.com/click/gjyh-8srkl-bx1x8-brqvcq8/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 2784 msedge.exe 2784 msedge.exe 3336 identity_helper.exe 3336 identity_helper.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2416 2784 msedge.exe 83 PID 2784 wrote to memory of 2416 2784 msedge.exe 83 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 5060 2784 msedge.exe 84 PID 2784 wrote to memory of 3060 2784 msedge.exe 85 PID 2784 wrote to memory of 3060 2784 msedge.exe 85 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86 PID 2784 wrote to memory of 2064 2784 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://click.vipcapitalfunding.com/click/gjyh-8srkl-bx1x8-brqvcq8/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbea0b46f8,0x7ffbea0b4708,0x7ffbea0b47182⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2908 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6132115196292780725,14730191118822208296,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5011193d03a2492ca44f9a78bdfb8caa5
SHA171c9ead344657b55b635898851385b5de45c7604
SHA256d21f642fdbc0f194081ffdd6a3d51b2781daef229ae6ba54c336156825b247a0
SHA512239c7d603721c694b7902996ba576c9d56acddca4e2e7bbe500039d26d0c6edafbbdc2d9f326f01d71e162872d6ff3247366481828e0659703507878ed3dd210
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\87fb2c31-de8e-407e-bb0f-54dc550a199f.tmp
Filesize5KB
MD522b32e77d9f59cb99ed1ae25c4e1b91a
SHA1a46ff9301dfa412159669c690471e07dbfc7664c
SHA256d820d38d5b4ff78a78768d295dc74ed54865e14e72f4bb1ac3303d4984bc8321
SHA5121b65adcb5d9d84ec29343b29355e0f452931047afbe875ed61edd51753576b77363a3f3264e3720fd047ee76a03c2c5113ceeebbc0917e7adde690a918174a61
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD50af72727a6c8151451bb1488eff19580
SHA18e8cef2f6eb7a78cf22826107a1689eac86344c4
SHA2561ad52b9ed2fa007bf55f7559072902d82a35b23ced1de03e02ac1ba2f363db13
SHA512db3e903aa7485ad72364aa90053c3d0b0d379f0232fc6943c8b825d790b4358dd3bd6db1ddc5659343498904b6ef247b2057c8b2217322d4b27982660eb62293
-
Filesize
2KB
MD526a25b7d8aa11083fe96c33d4f85e41f
SHA17f2a11686ccd7b95baf45d0ffd5d43da378f1aef
SHA256eb152bbeb6db40512722d2951f00d9ed70cec3d77e318e43f1ba6c0bcfeedb37
SHA512058b0047ac2881c85bfef74c74753fb633eee3006d31a6298fd4d1a2610382835a87bb5b9992e622203ce32fa92177cc5a2a9ff14b721c269efe17fb74492654
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5f394a0a053efa71d93189f222b1a5eaf
SHA13158ae4ba4615c0df9378d692e65b7e06ca55958
SHA2569aefa2cd0959b6ba037cc565c2c6134a56ae2dc00694061fdc8a4b0ff0f1c789
SHA51287b64648411f40d639208b0c51ede1461f11836b44f26137bfe2060ea3e327f2edc16b4394fc6d2b5a1266409d34643e59d9756e6a6e74a7a422274f10c84720
-
Filesize
24KB
MD5f5b764fa779a5880b1fbe26496fe2448
SHA1aa46339e9208e7218fb66b15e62324eb1c0722e8
SHA25697de05bd79a3fd624c0d06f4cb63c244b20a035308ab249a5ef3e503a9338f3d
SHA5125bfc27e6164bcd0e42cd9aec04ba6bf3a82113ba4ad85aa5d34a550266e20ea6a6e55550ae669af4c2091319e505e1309d27b7c50269c157da0f004d246fe745
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD551435bcdca5618de8c87eeec03e1861b
SHA1bc3b24b3aa5ae8fde308f8f71232e0e0350feb13
SHA2560771976bb5a7c866a9271e4b15602a458b93a1f946473aea4abdf35405c9a42d
SHA512e390eb9ae1c4fc91022dcc58dc197d120543e0e12afb25da51f4d98d78ebcdfd79374ec17da0f3844e4589a94577decf306a4fb1955a448c6cd967478101e571