Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/02/2024, 17:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://xresolver.com
Resource
win11-20240221-en
General
-
Target
http://xresolver.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4000 msedge.exe 4000 msedge.exe 1028 identity_helper.exe 1028 identity_helper.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 2432 4000 msedge.exe 79 PID 4000 wrote to memory of 2432 4000 msedge.exe 79 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 2852 4000 msedge.exe 82 PID 4000 wrote to memory of 4632 4000 msedge.exe 80 PID 4000 wrote to memory of 4632 4000 msedge.exe 80 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81 PID 4000 wrote to memory of 720 4000 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://xresolver.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8d6a83cb8,0x7ff8d6a83cc8,0x7ff8d6a83cd82⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1716,4327690526519229837,18227654464230547209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5577e1c0c1d7ab0053d280fcc67377478
SHA160032085bb950466bba9185ba965e228ec8915e5
SHA2561d2022a0870c1a97ae10e8df444b8ba182536ed838a749ad1e972c0ded85e158
SHA51239d3fd2d96aee014068f3fda389a40e3173c6ce5b200724c433c48ddffe864edfc6207bb0612b8a811ce41746b7771b81bce1b9cb71a28f07a251a607ce51ef5
-
Filesize
152B
MD5d4604cbec2768d84c36d8ab35dfed413
SHA1a5b3db6d2a1fa5a8de9999966172239a9b1340c2
SHA2564ea5e5f1ba02111bc2bc9320ae9a1ca7294d6b3afedc128717b4c6c9df70bde2
SHA512c8004e23dc8a51948a2a582a8ce6ebe1d2546e4c1c60e40c6583f5de1e29c0df20650d5cb36e5d2db3fa6b29b958acc3afd307c66f48c168e68cbb6bcfc52855
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD51ce840586a2849422865e534bdb071d9
SHA1434106bd6cd099d7f0eff914bb592e53b2251afb
SHA256e49546e8996339f72dd2e2370924e4c7ba589ca478ae6fd87e315f481c0e833f
SHA512f9e28d84bbf5aba3c80fa2550050bd43a491bcfe2461758c187c72ab1d74cdc3de9e4661b0c4eb407fe059a0be3f8a725acd7554ab4a5c894599ce132ff31820
-
Filesize
1KB
MD58b98b6846999a8232e52453465268666
SHA1abdba19827639f8e1f67a63f3bc234dd5f5cbb4c
SHA25657b110e1ba94bdbd338e35245c2f6b2b9babb9cfb9278453937d24da9695320d
SHA5126ced814c1df92f07da9fe483c8d91a24cf194cd5799a89be181c61e6d05231cacd4e2325ee3d42c993d36df51a94a13a59f1c834febcb7e82b6b3b12ab941c97
-
Filesize
1KB
MD56b0367a2898f35481956895178622aa3
SHA169fa6ebda9ada2d7a8bb5a7da783a13f6bc64c06
SHA2568d56ace2bd3707217932773c7168d7991bcdb0cceefe086d5ab736a1983533e4
SHA512b8784739daf5887be9c66d814709044fe08bf9819fdbfe1748b62edf2e8ae15248cbf0388daab28e1ad7ec8f64a8e2f492831a5b654fcc217f0043e4c4a6814b
-
Filesize
5KB
MD59d1455fefc416b64f7c9fa1b6f0b6fd2
SHA15df40ad0229136ef2417b8cdb5c13364b46ed07f
SHA256049392efe9e2bcf36954c7d0c77a61e7246c56f3783b85b1d9d9ae57b620bd83
SHA512ae9fe8202d846095a5f70d7e4e562508ca5061f7f55eb9d594e570573e7853e303b0a45b6d3f7c0eb8b3ee6e24253d2739655428fcc0b8ebaea5acf690ac67ee
-
Filesize
6KB
MD5b769579fb0630a8fca1b51ec3b616d83
SHA12e8f71a8320fa7378062e15cf3bd3796510c78a4
SHA25678805a31933d3264f243a87026c9389d1bebc2e7b503387fc4dc5e5db5112e5c
SHA512684e276a54e77b699c6f679733d77b861f5af62dc705d2ae475bebdcd318da2c6ddbe50aa83fed407ae964a017fd3d7e430e430a4d3f2921fec36a5b290021fc
-
Filesize
6KB
MD53df61d9ca4d001179252cc707619ddb8
SHA14ff8ebf1afdd5cbba897d4a890e7e3800e17e9f9
SHA256c0178885f7af5e67655fcbd6a77c86026bc2f620555a89a55a0550ae4b07410c
SHA5122deca7eb611f80dab1bac5b51e6f14e823cf16a866ee6b08145b5fac81318cea142515a6b4b2d4a3800e9620467ef9602d25a2dada61119944c8354a1a4eb34f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e0ad8b3ef50b1ec641a1674e47025707
SHA1f8112313e3dcf1e69a67f8e4bb88319dae36730b
SHA256d8fa6bc94493311834bd0b76f0c89e5b671484acb6c43bb3c2a1fa74b98b007f
SHA5125b09e6ca58006c35e0dcf507d12175002e18ba8fcfe7b29ffe1430f7901ae54f4f3a6dea9895450df949d67f34e6b8f1fc6c7f79afcb71a351a7c8339cff3a8e
-
Filesize
12KB
MD50f0e23ca8c4628636631bf098425d945
SHA11f5b22fc2dc828e50275f3c6c84b1424a955e950
SHA256e01d0f66a8ed6b3c73bd75037aca36a49063b584571f82ee82d44dcc77ff0ea2
SHA512cc7a8509a02fdaba33ce3c2d0cf9d22af9754727ece14000df040cc2cbe54d344bc7875d8525469b7ff92e2a40c11ba0618faa6719dc3a5657c86b8c8c684954
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84