Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 19:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sai360-traton-grc-elearning.csod.com/
Resource
win10v2004-20240221-en
General
-
Target
https://sai360-traton-grc-elearning.csod.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 4408 msedge.exe 4408 msedge.exe 2440 identity_helper.exe 2440 identity_helper.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 1116 4408 msedge.exe 81 PID 4408 wrote to memory of 1116 4408 msedge.exe 81 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2172 4408 msedge.exe 86 PID 4408 wrote to memory of 2028 4408 msedge.exe 87 PID 4408 wrote to memory of 2028 4408 msedge.exe 87 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88 PID 4408 wrote to memory of 3308 4408 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://sai360-traton-grc-elearning.csod.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffd6cfa46f8,0x7ffd6cfa4708,0x7ffd6cfa47182⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4600383453393107696,8794672944046116857,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f4db60c9bb06ea5452df26771fa873ac
SHA1c118183a1315a285606f81da05fc19367a2cdfe1
SHA256f168242e74bfde18bacb9e18945a39bb447188eba916c7adf0f342ed8d82281e
SHA512180ed98f9d5a14a22687a099c4a0ba6b586610f7b8b4c8de89f3b91713b07a2ef3726fcd318cb4e270b1745213b898037d29cca4b490d0c91833b797d69ac406
-
Filesize
152B
MD5f5b0bf4edca2187f7715ddd49777a1b2
SHA1eb78099013d0894a11c48d496f48973585f0c7c0
SHA256562016f9159ef363fcbe62ed13ee26052b31d4f67dc5ea6d60864a7d5dfa50a1
SHA5121039b98cffd32ca4c9e37486b96e01b167d76b19dd8440a21da4932d677c463f4c5ce2260239e8337f59bd61ff3111905e23ab71d3ca5b20e7d2935fea7952c9
-
Filesize
25KB
MD5b62553925bd98826c60457d2eb6b9a46
SHA184dbbb6d9b36a587c21b5a56b1d9e587e33ba943
SHA256c58166fe4df4ba8f25a960c21451eaf841d97f6f552f104e43431c9db1c2e2cc
SHA5127b6872144ae308224ff671a1ec63f040a40115888790cf6834ad85d517471ce5dad3ec297ee751fb196b55118a181017151f7f06fce0f2f26ff94e8eec070033
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD53aa1a739974d975bdcf42f70232d8359
SHA1378442ffd5fbd053231eab9547ce4b6f7b0c8214
SHA25689a90688f2c98edb3c8a29d7b5e700d5fae44d84e1aa6eaa43a1d60332f9b918
SHA5121cc8906909b1f088102d621ef41b5cb7990bf356e9a7eaa69e36c79fb00ec22713a1248959d096d4072ee5169bef7fde9c31aa104d3dae46e69191130175f552
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD54ad1ea3695c7dcc5b3008bd532a66974
SHA1c4dfb71b97eaded9a2faa3f3ced401a606b8bdcb
SHA2568ea90e524aa9e62f48c0e0f182a0baf00f6eee657c6d0b7bfa4b62094fa2fc92
SHA512358de8687522b316b953cc999f18d73a636c1b21a22a8e32ddd8fee003ebbce8ca219f33fabc9e2208a21d0c5f5d4a5d60e4fa45a454d860ad559fe40d01996c
-
Filesize
204B
MD5765f590ed01cc6930946f8b8a960adbc
SHA14839f9b8c0a634cd658129de1c87a63d5b6b7168
SHA256087a35edeb5f896c28790d31b0c941dd1de633ec166382523b01aaa35a61edea
SHA512b5e77c40f1f27ab43310f204ec61dc922b6f7d260cbb26d6ade9477bb6a567fa031c34dfd1ed30337c1256b567be5cb62ceae4250dde3db4aa4ff02f3c8de39b
-
Filesize
6KB
MD51e293a334419b862f92176d91840c489
SHA1e3ebaa2ea2d1c6d5d53edb6a7d21e9823a15b28b
SHA2569a268dfb38d1e50eb1df35007efbdebd3a2c657a5111c6067bda7846279e5274
SHA512a0a9accff010e86a58f15fbeea44ee50d7da419b9d065d291cb500f97b0b8af28294863d30a3a0b9efa1c80e427a9b0fb1825f620ad3215f52f736abdda8a81c
-
Filesize
6KB
MD540d8423a40921e0daee71177f4ec4c6f
SHA1d90d5bfdbb6f737211b0e5b7301a5aab2844cacb
SHA256def35b1bc699481186aa07662888be9e5f91d98e269579f32418e19cb9856436
SHA51287c163b87a19de9cf0ecb85de75fdc8a46f745b22b0503cf125e69dc5d1d0a37637383f4159e3262dcb6907acdb8ae18da66520e7380860a2fe4866bab49f69f
-
Filesize
6KB
MD536f3f50e75f420bec6b36a4f67e19d62
SHA1987d1cb50ddb3c19a756b1dfc2f987af7077db6e
SHA2564c52c7cd8ab8155ad72f7e46e4c629c80726777ed76711c9f234ef6dc1a7866a
SHA5125928dc50226f4e922b6f4617c0d5677c07e5e1f277029fd0594ac21efbd4a160ec3f559cca1f661d28f1587acf51d3068f0643fc50fda9c4c34f8c7a99448304
-
Filesize
203B
MD54b94c5e159570c7208dd7f83dbfac6d6
SHA1b886f757b8f3a925b343e59ac88116b13575d45b
SHA2568edfdc675298a5f32a5cdcb44be3ed86eb39632d22fceb48af801fdae9d0e21e
SHA512b7ca74c98ee0d8eec8d7de85246019b7ce2c966457233220d7c3af838d3b5d5602703aed61aac822d4a10497a3130e73d62817b1defce01149e3296304156511
-
Filesize
203B
MD54cb90192d25c1b67d50153b142bea1d2
SHA1cdbbc0e7462beb4ccd96fe369694d4cb7accdc67
SHA256490cbb622af86879a294f4a03ac59696eac8aec1f593d9f5feb021635b33099c
SHA5122b05f078d29cdf4f1535d6edf5bd552ee81ba2236c9491625754899e0eef919bea32a6b0ed80c3a6cbc23cfcb369ee29fcd26c7d9f819a2cbb08780e06048579
-
Filesize
203B
MD5fd74af2597fa13e57d94982d13ecb5b7
SHA131cdef093b1952885b41afe8923bbfcac4113c3a
SHA2564738fe9ccff748df2ec5c5c1172dcec5415023c5d30b78c538676bf099594ef8
SHA512af54633456e207d302c93fd0b33537e06adc473d315cd84936ea7e51c4f2776fdb3e50afb835ba9c38e33faad82b71f627cbd16eb2b6b02820431daca72077c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a0ae603c551e821334ce4c6206e252bc
SHA1558a2621b6aea449738d15cfff8534e21df48273
SHA25621a5c6eb99c4902e56a6dc40d2e3d1f6dcc84fdd45ef99becb10a81f0f16e5f2
SHA5123c10c7f4b66fe2dc08a9ad728f9c74c04fc83b74efa725b9a70e0abdcc4234d1a07ab312b830d65546580684e8f52f956952b0d2344b6af5fa15cd6007be431f
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84