Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1744s -
max time network
1760s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 23:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://exego.app/ItIJQgI
Resource
win10v2004-20240221-en
General
-
Target
https://exego.app/ItIJQgI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1564 msedge.exe 1564 msedge.exe 2232 msedge.exe 2232 msedge.exe 2836 identity_helper.exe 2836 identity_helper.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3168 2232 msedge.exe 40 PID 2232 wrote to memory of 3168 2232 msedge.exe 40 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 836 2232 msedge.exe 90 PID 2232 wrote to memory of 1564 2232 msedge.exe 91 PID 2232 wrote to memory of 1564 2232 msedge.exe 91 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92 PID 2232 wrote to memory of 5060 2232 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://exego.app/ItIJQgI1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb56246f8,0x7ffeb5624708,0x7ffeb56247182⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,3331466322966312966,7606151715437998660,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f4db60c9bb06ea5452df26771fa873ac
SHA1c118183a1315a285606f81da05fc19367a2cdfe1
SHA256f168242e74bfde18bacb9e18945a39bb447188eba916c7adf0f342ed8d82281e
SHA512180ed98f9d5a14a22687a099c4a0ba6b586610f7b8b4c8de89f3b91713b07a2ef3726fcd318cb4e270b1745213b898037d29cca4b490d0c91833b797d69ac406
-
Filesize
152B
MD5f5b0bf4edca2187f7715ddd49777a1b2
SHA1eb78099013d0894a11c48d496f48973585f0c7c0
SHA256562016f9159ef363fcbe62ed13ee26052b31d4f67dc5ea6d60864a7d5dfa50a1
SHA5121039b98cffd32ca4c9e37486b96e01b167d76b19dd8440a21da4932d677c463f4c5ce2260239e8337f59bd61ff3111905e23ab71d3ca5b20e7d2935fea7952c9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5019365e0a1a6f5d9f5a9aae665f74369
SHA1c23bb6186aea0fa63d313e205bf7bdda1c0580b9
SHA25679d81f436416f8579849743c1360eceea6290bf3ccff3c26c057f4b19cf682d2
SHA5124ffa8a7b55c5a86c5cfe8e5f0a0eab10ccbcd9824cd0e091ee4a962c57a7c55fabf73383c0c116b1af8bc6d14991c6e0996600c8c86d2c30acc501fee34b4791
-
Filesize
2KB
MD54016be17cf1b1f0dbc41ef2ed47fb4c9
SHA1da6592a17fd9069276c8351e2e5a27e87e34a8f4
SHA25688a27ba6e78bf9a0dc212e7631e71881100dbb32ed186f8d203d9a5070e219ae
SHA512bd67529fde7c40240e04bb0e42f203d7cf90dd4ece5f3cc50ad0ed1cb8b2e325cca44286bead29cc312759f9001ec33d7ef50814b934a2715285b08892bc32ba
-
Filesize
6KB
MD5de3d37a9721aecdccae879ad724d0f0d
SHA1d9279f3690c61c0b9acaf24e064e12e5926d7fe8
SHA25645ffaaf95783492003bd7b8d4c20e510727fd8a1accf3056c233b9c91968fd85
SHA512c72b78754017d2392270a20d37ed04de6559518e6d81b16a85cde53cdb6bd8c25a61d7fda5f2856c6ac486d56abdc68c7e22334a5a0f7d170be3284c2f140572
-
Filesize
7KB
MD511da38f9c7efd73997fba0c1fc4116e7
SHA12744288ac2bc5ee285dbe6b5187f9e7581e9c5c7
SHA2563372573488bda7e9d4aa4a4d8168732cf29757c592fb1b31ecd615729658600e
SHA51215260c99dea6f356dd7af29fb0651467f97c06ae53e99b07aed14a980c6a5ab7d6df597abc74293fc47e274528cc4dc436894157e82c05fd6cb3ee4ff39c07be
-
Filesize
6KB
MD53795850526b1f21d7f618347933854a2
SHA18554319f445f709199c11edbe146f63a6ee72a8a
SHA256573b8013bc079fbfcf6ef61bf207fc53a25c63c0be97b6b2f16cdf08c753f826
SHA512190fdd73e71b9f21967fe4095f7d6b459ab99f63e381a6fbdf25ee1b4a8761c6152b34d15e59241f50b5d8defdf37b80c86923045cd621abc9c443c3c6e0ef68
-
Filesize
7KB
MD5565345bdf0f826002be4fdc53960be8d
SHA114052d65902146cbbc689d744faea4bf860fedbd
SHA256ba613972c074f3d8af2bca2df6ccb220025769ec3b46587da72ddc4039f77ee3
SHA512f5458c687d9a8ec5c78b1d6dd0ec911d96c1fc89602d97b23132750a86fded57477a81966b2b6ff3e60bdfbac5da894e9bba026a19f879b3b56bf1f2a6b44842
-
Filesize
535B
MD50be95d640658cfbd7a77fbf22beeba15
SHA1d9d5e096eca2d9275c5d48bc183f589496f4bf63
SHA256ebf0dea4a74cbece6f40323d2ad9f3e035bd5024494ac0ba99ec875d55ef730f
SHA5120f6eac1a8d9dd734b6eb123c4e236f511074da061d8d51473a25a333707fecd0bf5fbd4ba3494bdfcd85abab9f3dcd7a153afcdd8234fef15b47a88c9b268a82
-
Filesize
533B
MD5b5cb2bf343d43e24a2402e16a2640da6
SHA12d76bd0271c0265787186fe3bfd2dc986040fd17
SHA25608178e9964c735941cac94d9d3bdcf3c450faa92cba7d3425e3f1ec1db0d254e
SHA512198b631aa6c257dacefc99fbe6386caa5df7114ba748346cbc577f21e17cba19a212b011b4f2b3a30c922483e3a80d0c69106a746d243a7ea2ac04e69292ef53
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58f6854468f9a53fe83ae582319af43e2
SHA179e39495c920a97ba0b1819c89c2c0a8844f2139
SHA256735960f5e2f8b54f485a1d1abf89f54cfae7193145d2e67bd2356302bac8542a
SHA512bfcff74e391d74d355114af6d2b3f2b590b0c2597c69cec6c902315c4b1a3a679a91d1cf5af71a5e20c989056d885c35ba5c15ae1c7b748cae47daa47fdfaa7a
-
Filesize
11KB
MD5ade0890e65091140427881323baa3264
SHA1f9ef4ef63094d3fdd717c2117dbf37d9e01b5fc5
SHA25633e8d64905f4653d569db5b1a19259075fa059bfb236f01c427d12122c8c08a5
SHA512886b091562ce2b8f61128407098417b633cc0e13328811097ee909bedf3ebe9aacb08c74acb4f84fc7dae7867c859a8a59276f94b7056a88034c15fc985a6a16