Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
20/02/2024, 14:57
240220-sb21ssab21 120/02/2024, 14:55
240220-sagcpsae96 120/02/2024, 14:36
240220-ryrynsac47 1Analysis
-
max time kernel
108s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 14:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://17ebook.co
Resource
win10v2004-20231215-en
General
-
Target
http://17ebook.co
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4980 msedge.exe 4980 msedge.exe 920 identity_helper.exe 920 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 888 4980 msedge.exe 87 PID 4980 wrote to memory of 888 4980 msedge.exe 87 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4068 4980 msedge.exe 89 PID 4980 wrote to memory of 4556 4980 msedge.exe 88 PID 4980 wrote to memory of 4556 4980 msedge.exe 88 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90 PID 4980 wrote to memory of 2608 4980 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://17ebook.co1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdad1746f8,0x7ffdad174708,0x7ffdad1747182⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14395361512109365513,1102517323257987566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14395361512109365513,1102517323257987566,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14395361512109365513,1102517323257987566,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14395361512109365513,1102517323257987566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14395361512109365513,1102517323257987566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14395361512109365513,1102517323257987566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14395361512109365513,1102517323257987566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2924
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bcaf436ee5fed204f08c14d7517436eb
SHA1637817252f1e2ab00275cd5b5a285a22980295ff
SHA256de776d807ae7f2e809af69746f85ea99e0771bbdaaed78a764a6035dabe7f120
SHA5127e6cf2fdffdcf444f6ef4a50a6f9ef1dfb853301467e3f4784c9ee905c3bf159dc3ee9145d77dbf72637d5b99242525eb951b91c020e5f4e5cfcfd965443258c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5aad8337ee61a3f0bf9b025790d161daf
SHA12707627b3d69d33f2e5fb1e71694f1acc7f6fe71
SHA256bdf858fed4f2ef9f3d16329610e9e924afd489f23f99912aa81df5f0667089ce
SHA51211cc179aa4df5e1512e83ca4d49e32f93a675eeebe33964854ab22a85872e9a52c0806d7255c3add4d5ba28def2ab03282e2a6dc954e5cb6b0d759c5906ae6de
-
Filesize
24KB
MD5f543a81a2066cc1e553b4c18f5d99e8b
SHA14b98c3c55114bf646766318e71f28b61e9454c25
SHA256f388b2738e0ede71bd2d52b37d7b6ee3aa3fc4f9866055019b78ca67a3423b9a
SHA5125e768a33e602a0c2327d436af2e28e3cbd291368d0ae5b7f3dd7b80fcca073fc101b7c11e295140a057651d76a988308a3ab31ddd93841e18eaf5c6c6998b88e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b4f44495-fae2-4d3f-8f92-8d84ead2f887.tmp
Filesize6KB
MD518c5ba36ec0857a8731ea51b2aca5073
SHA1c2b56229518401769af39bc9348f653c87ddc1fa
SHA256e05e35bfac12f05fa9474cc0b6a58f694e0a458279b64522e12c9c9f34ea439b
SHA51296030b57f571624252a86d550a1dfcaaa7dcc996ddd90bf49bcd579f81909194d8f5a003f928fe41e200a29685b4c48cc7fe1da4884fd8e8ec9b8d086e4312f6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e19b4a511de8c239fb974f4e5960a0e1
SHA1b5b1c33e1ecc8165b13df4de714d48951c1ad6cc
SHA256a58deb0576d993bbe0fd790ee244c7611eaa8b280aae5fb0ecb7308b7b7a9ded
SHA512070cee7e86db11504cbcf87df684535116082dd895702806ee695b72f3b29f47675ef19a62f53d2669c322d1852b9e09f2f9dbacb796e871f25d59e49eeb7c76