Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 05:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://uamtu.com
Resource
win10v2004-20240221-en
General
-
Target
http://uamtu.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 2196 msedge.exe 2196 msedge.exe 5036 identity_helper.exe 5036 identity_helper.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2692 2196 msedge.exe 59 PID 2196 wrote to memory of 2692 2196 msedge.exe 59 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 4924 2196 msedge.exe 86 PID 2196 wrote to memory of 3260 2196 msedge.exe 85 PID 2196 wrote to memory of 3260 2196 msedge.exe 85 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87 PID 2196 wrote to memory of 2240 2196 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://uamtu.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1c4f46f8,0x7ffc1c4f4708,0x7ffc1c4f47182⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1708 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,12728094863029494015,13938447497954633664,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e189354a800c436e6cec7c07e6c0feea
SHA15c84fbda33c9276736ff3cb01d30ff34b032f781
SHA256826adca1e688de79a3ec5b91c75990927fb2a33ae717f474608c68336053f427
SHA512ceb069a5e83a634503e253846fa17b8bf7aaa539c3353ce61251633d69068e24c5eadd1b496f43058790d2b513e65d2c0b0213730813d0b58bb82a00596e05e4
-
Filesize
152B
MD5b9e3e150cfe464e9ebf0a6db1aa5e7a2
SHA13cb184e2781c07ac000661bf82e3857a83601813
SHA2562325a6292907263d1fb089a09f22fbcc6bad56f4961d427efdef1abaef097bcc
SHA512f5eb1e76eb9441cf5000d8d4db9296077b61714ead5012779c084b37f4bba07614055738f5dce69b13b25975d9b7c03eab049b7685eee09b23fd8d4a7d71a039
-
Filesize
6KB
MD5122cacf5b587ff0da548283866b8ea14
SHA151f30606dbc2acdbb9c89e444e82535fcdf35f58
SHA2566b61a0a9087f9a83336a5e0a714e4abef36a057eb809d9741946ba64a9974cc5
SHA512db3722978aa2996465b1d0aa4a2b06f942a9f440575d0c81b1ecff83197396fcb01c5bb86c7e866d697db7bfd79b83921723c68025bdbe4f5562b526cb611971
-
Filesize
6KB
MD56f0cba81a96b38678b1464a4c79da72c
SHA11b35b7e3206e36160accc4e030374ddedfb102ca
SHA256157706b703808133c23589d6023ad134324fde580c2b5d9d2a2d8b2fbc6c3880
SHA51275b27afb7b1ca01784c1a2f22e35aaebd252f26560739b6abbcd375a28eb7a57b2fb2034f56abe2d8f772fa30d769bda0f0c99e015bde10ff98b994771e16418
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d4868598b25ae6917d317827a3f1f64b
SHA11ac89859546fabc7beff0d03294b23f4c16e67ef
SHA25683c737a756550e6b7b01b9b71652b4a9124f82aa37d8d33ff7b9e59d8a5fce2b
SHA5122a48e0f254d04135a65d39438cee065d910cca6b59e14f3a787b269c422a1e6c7d32806e886451fbde0e3b2a3495004d0d49f249ea2889eaa19fa0aa168a666a