Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1681s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 17:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://sourceforge.net/projects/orphamielautoclicker/files/lastest/download
Resource
win10v2004-20240221-en
General
-
Target
http://sourceforge.net/projects/orphamielautoclicker/files/lastest/download
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 4552 msedge.exe 4552 msedge.exe 1860 identity_helper.exe 1860 identity_helper.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 652 3164 msedge.exe 82 PID 3164 wrote to memory of 652 3164 msedge.exe 82 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4892 3164 msedge.exe 85 PID 3164 wrote to memory of 4552 3164 msedge.exe 84 PID 3164 wrote to memory of 4552 3164 msedge.exe 84 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86 PID 3164 wrote to memory of 4248 3164 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://sourceforge.net/projects/orphamielautoclicker/files/lastest/download1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98c8346f8,0x7ff98c834708,0x7ff98c8347182⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2441543918950927398,2415607449565221689,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD558670ac03d80eb4bd1cec7ac5672d2e8
SHA1276295d2f9e58fb0b8ef03bd9567227fb94e03f7
SHA25676e1645d9c4f363b34e554822cfe0d53ff1fce5e994acdf1edeff13ae8df30f8
SHA51299fe23263de36ec0c8b6b3b0205df264250392cc9c0dd8fa28cf954ff39f9541f722f96a84fbc0b4e42cfd042f064525a6be4b220c0180109f8b1d51bbdef8ff
-
Filesize
152B
MD53782686f747f4a85739b170a3898b645
SHA181ae1c4fd3d1fddb50b3773e66439367788c219c
SHA25667ee813be3c6598a8ea02cd5bb5453fc0aa114606e3fc7ad216f205fe46dfc13
SHA51254eb860107637a611150ff18ac57856257bf650f70dce822de234aee644423080b570632208d38e45e2f0d2bf60ca2684d3c3480f9637ea4ad81f2bcfb9f24d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD54fc0d11b53b5c2c0f24ff94a990771ed
SHA1d8a4793f03c50d13308989edefbec1763fcfdade
SHA256c167e6e2b4171adde6a238d8de66c475bdbd4344776670b840d9f882dcb1a758
SHA512190ab95308b543f26b772c718a2792db012e8fb4f2437d6fca886d7560a5fa267d05c50eedff55692eb357ad9b5fb81b7bb657d40e558ac6cc5198e963bc8a15
-
Filesize
401B
MD572472bd29a48c3fd6baaf3032e644bcd
SHA18d8d3427429ccf65ad23e79811ff6ed602faaa36
SHA2563854b804facc975b88d8798524c29c027642d5be8897ace2dd1ee3a562844be0
SHA51230d947ced40d3cec67614adfbe047b1208b577eb234d26459368ca41af55625ddc6f9fd492b5c76409b4a2a46a5d4faa20ff1814e803b9bf0d4c4e71dad72dc7
-
Filesize
6KB
MD59202a7a0e5d0af54a7fe815618fc9ac8
SHA12e54fd82f5459680d1b13334a5218f2f43d6b09e
SHA25656580d7672609318cda4292b41420d9da4a44cbebae95ad3d47d37f3cf348de4
SHA5127993bf6d0d90354d28fa7e70d36a4a569071c9f61f661dbc16d62d150e74d7640c3ba4bcd76304297d2c92b3ebb6bd25518e7f3509f93846b7f8d4387395f5a6
-
Filesize
6KB
MD5bdab546534ecdb17282fcf438edca77b
SHA1afd3b3f27d8c68ff3ade8c4aff5bc53828738a15
SHA25685e937dc02813a7c72d1e0b414c449bebb6b5a0961bf1c79a3cd559dbe5fe8b8
SHA51223c86cc20aa034fb0ceaba58f13b6e332d4fead0db60b2b7c4b91d91321ef8f21266d9c87448b675122fea6b1cec0d288319bf2b8a1511650756470a29e54b84
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5c71093977f3fb45dce7637a3b72c83f2
SHA11df372960c3c705b4663c84f5de18beabd3924ad
SHA25668c419d32d32f86a0068aa3ee5323bc49a6acb9dbeb43071fdb4cdbe60bd25cc
SHA512538a762e810bca5bcdbda8ea81aaac0829df98ad6fce224421d548bddef472a9f345bd0c58cbd382c2c5bc69045a1b35378c494472ece6b8673ba3001f60266d