Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 23:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fedsequip.com
Resource
win10v2004-20240221-en
General
-
Target
https://fedsequip.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 4948 msedge.exe 4948 msedge.exe 4328 identity_helper.exe 4328 identity_helper.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4436 4948 msedge.exe 37 PID 4948 wrote to memory of 4436 4948 msedge.exe 37 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 4456 4948 msedge.exe 86 PID 4948 wrote to memory of 3624 4948 msedge.exe 87 PID 4948 wrote to memory of 3624 4948 msedge.exe 87 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88 PID 4948 wrote to memory of 2204 4948 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://fedsequip.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8320f46f8,0x7ff8320f4708,0x7ff8320f47182⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12678335403598223581,768793195081427904,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51af9fbc1d4655baf2df9e8948103d616
SHA1c58d5c208d0d5aab5b6979b64102b0086799b0bf
SHA256e83daa7b2af963dbb884d82919710164e2337f0f9f5e5c56ee4b7129d160c135
SHA512714d0ff527a8a24ec5d32a0a2b74e402ee933ea86e42d3e2fb5615c8345e6c09aa1c2ddf2dea53d71c5a666483a3b494b894326fea0cc1d8a06d3b32ec9397d3
-
Filesize
152B
MD5aa6f46176fbc19ccf3e361dc1135ece0
SHA1cb1f8c693b88331e9513b77efe47be9e43c43b12
SHA2562f5ba493c7c4192e9310cea3a96cfec4fd14c6285af6e3659627ab177e560819
SHA5125d26fdffebeb1eb5adde9f7da19fe7069e364d3f68670013cb0cc3e2b40bf1fbcb9bdebbfe999747caf141c88ccd53bd4acf2074283e4bde46b8c28fbae296f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD573199a7c1338cb4706aa30c77ae424ec
SHA17eb7c26853b8d2ec0af963edbf45ec038e307984
SHA256e5c0f9ab86c8e769edbb7ff200414b33fa427a60398121904fe5f5f1f48a41ed
SHA512b9196f4e8baf9fb6db302a04127b166f8c9a75eeb698ae74b49f3c1b5a07a519c51c9718f61ab741509f34f06a6d528a83c77da60d17ff9288f8b3c704559e3f
-
Filesize
554B
MD5b8ce3054ceaa1bea5be7ba499b349cc1
SHA168b09ef125ecbdd26a11a616e4e13f20f3ed2d98
SHA2568709bda26d8b274c18d919563a43321f6e5ce1c3efa0e6143d48c4779630f646
SHA512507f377d31fada379dd371ad165843b1e8915018e51c492f8bc4989d4dad2a403ac2bbc6976a43974234cf5a79df5ffafd34ddae69c6a78ddcceed4d754da6de
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5b27e3e9ee179f11e27a2fae7b013d169
SHA153ab7f86f9dbb472e2a9662d64f93132a5fd2c73
SHA256e5675245792de2c8086d8d7ef1b55dd41bd48b436150068695c82c1e9c81f90a
SHA51233c4fc5b44835aac4d5fdf3a05c50c560c68595c58b9795704297ff63a546d3b6f962cd4af6d9329099b82638e552771093ef3d1f061a28f0faf9a0bc62861bc
-
Filesize
6KB
MD5aef78d4536169b2926f5d12510b1ef91
SHA1154a59796c8ae26507c1ca7062ec0b90dd11b220
SHA256db78b83f5fc6cefa8e1c61bfe96c2eccffea9351c8de36eedbe2e9159bbbc808
SHA512b9fe7ac8add6d7ad153dc1cda50a630310702af4c3d71d5630031c852ad2aa9a767f884bbdaa26b418b2cf65450442fe560a187904fb26817978fca35a41a77a
-
Filesize
6KB
MD5a6418abb568baa1771b2e69236adca76
SHA15f3683fee6a0d5837ebe989b5f54e478a390896b
SHA2561f96e32ddd1556c33c813375470bcf7358aa5f832f00131c1f15af90fbedb4bf
SHA512280acdb35301ce661faf0f5c364ebb6bbee475a33e92f7b574792243cb5a5591c2d7fc1d6a8d0f049011d1cea783e0ca1381459f59e94fb924177ef51cf40313
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b72a6e84d0f10cca91f5b47f987c5ada
SHA175aff6335630e8c22f0874057849426358cfc916
SHA256c510e0beef39b9b4a9ebed69f6ced033a8fdcad94028e8a2752ed14f7a9ed3f9
SHA512aa348e9a06c3d050e4182822449fba502818c1f35359584eba6a3ce33273ff2763c8b9ecdc97e130875cb144e9aeacf29d3646e57e69e62936d5b2933bb1ffc1