Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 18:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Ransomware/PowerPoint.exe
Resource
win10v2004-20240221-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Ransomware/PowerPoint.exe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 224 msedge.exe 224 msedge.exe 1504 identity_helper.exe 1504 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 4560 224 msedge.exe 30 PID 224 wrote to memory of 4560 224 msedge.exe 30 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 3140 224 msedge.exe 86 PID 224 wrote to memory of 2988 224 msedge.exe 85 PID 224 wrote to memory of 2988 224 msedge.exe 85 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87 PID 224 wrote to memory of 4788 224 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Ransomware/PowerPoint.exe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd28946f8,0x7fffd2894708,0x7fffd28947182⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,13528043253990446548,15208291584688958364,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,13528043253990446548,15208291584688958364,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,13528043253990446548,15208291584688958364,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13528043253990446548,15208291584688958364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13528043253990446548,15208291584688958364,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,13528043253990446548,15208291584688958364,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,13528043253990446548,15208291584688958364,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51af9fbc1d4655baf2df9e8948103d616
SHA1c58d5c208d0d5aab5b6979b64102b0086799b0bf
SHA256e83daa7b2af963dbb884d82919710164e2337f0f9f5e5c56ee4b7129d160c135
SHA512714d0ff527a8a24ec5d32a0a2b74e402ee933ea86e42d3e2fb5615c8345e6c09aa1c2ddf2dea53d71c5a666483a3b494b894326fea0cc1d8a06d3b32ec9397d3
-
Filesize
152B
MD5aa6f46176fbc19ccf3e361dc1135ece0
SHA1cb1f8c693b88331e9513b77efe47be9e43c43b12
SHA2562f5ba493c7c4192e9310cea3a96cfec4fd14c6285af6e3659627ab177e560819
SHA5125d26fdffebeb1eb5adde9f7da19fe7069e364d3f68670013cb0cc3e2b40bf1fbcb9bdebbfe999747caf141c88ccd53bd4acf2074283e4bde46b8c28fbae296f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD52372ec1569cf56e9c27ece6e4bb6c454
SHA173855fd2e0666b74ef48a02aa5bb8a570993d948
SHA256959900ecaf5698dd8f9b8bf80828f9e59fdddd403d4f30132d167554ca74f2e4
SHA5120effe9cca64b3976d48c14fb3f8bc0a802b86e1c50700262f743370a14288a772beb63996a87af8082565d7e190126f1cebdf769882d55f2117ab34fd5804acf
-
Filesize
496B
MD5d22266ba3d8db30279b96944f0cec985
SHA144e288cdfe75a5e8299ce32e75dd9e0705cdbac9
SHA25677873629fa695e434160c86ae9116906ff65a97666d7d35a3ed63221b627c0bf
SHA512d463aecbdac835dace5544b4267c86c2ed7d3165ba95095db6dfc3a25655f2391fa202a81d37b4a76a36f04456ed86df137302ad0e456fd59ecdfee3c69c6c1b
-
Filesize
6KB
MD599cee5e95372e4cf1ec1cbb822793fdc
SHA11451277474dcd630fa195fb40d3e186583220a6e
SHA256feb1da3d46ec4f1d170aca5ef4abf8ce00118064878bfcf850a2ee186457ec3a
SHA5122fa76e03d7ce7e10bd6cca427ee71a6a165d749014baba84d9ad99913349d376fced67c2071d3c3a7d9819b7a5d20c0cb4750ef58fa56e5519f217ebdfce388c
-
Filesize
6KB
MD5649b96bd30ffcb0c0fa1ad33ca40d0f6
SHA1fce9e9e25aaa5043049668b51462375ce937d172
SHA256635cda525ce9747eabc830c3641b4e8218444f45a4849ec909e9f672379e4a3a
SHA5129dea44fafe2c2b20fa577ae6f5095a8327516cb6d82cf7386e28c7f857833f815a7b3faa5430ba9f4a71e5b9d8bf0cd4e981f142fe8dce1e8c496ce8f91efd4e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58c8c6cffd7657bc66e2b9cff15d713b8
SHA14114be3b803b143a8b1111e4afd2964643e262e3
SHA256ce8bd7dc0bdf5063136eebb7c2690f23c51057270d97d557bdfd7f7b65feb5b4
SHA5120432d8cfd9e8d7992783aa1bf5cfac3952df27c0f4c9d248c3fda499a797fc053758282fbb0c85c318a7ff0d289e36edac5cf2b459ef81ed6dd6e483606a004d