Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 19:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ggqz74bab.cc.rs6.net/tn.jsp
Resource
win10v2004-20240226-en
General
-
Target
http://ggqz74bab.cc.rs6.net/tn.jsp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 320 msedge.exe 320 msedge.exe 3896 identity_helper.exe 3896 identity_helper.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 3940 1344 msedge.exe 85 PID 1344 wrote to memory of 3940 1344 msedge.exe 85 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 3260 1344 msedge.exe 87 PID 1344 wrote to memory of 320 1344 msedge.exe 88 PID 1344 wrote to memory of 320 1344 msedge.exe 88 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89 PID 1344 wrote to memory of 3036 1344 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ggqz74bab.cc.rs6.net/tn.jsp1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc93e46f8,0x7ffcc93e4708,0x7ffcc93e47182⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1832 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3889779989980949874,5009939091900234596,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
337B
MD59fda9e210aba683abbf2dcb32051fcdd
SHA18401e99749ccbaaf3e2dfbf7bd8d729c6d56ddab
SHA256e0b75f5acb4e646e56a6b47a33292dd7c258286cc619e66cf671f72685aff9bf
SHA51265c24206cea4bb4b6b15b7b0e6f536a9a456ea582dfa5945a394dbe14b48d0bf2c37b4744b728e7127980988c50cb0b92fd2b189316e524327da1427eace0671
-
Filesize
6KB
MD51c78717b67f57ed3b6ab8af545c3e6f7
SHA1c0126c481901da8520e5f4f515c69b0a98a8abf3
SHA25609fe3e8a42de7bf1d516ae0a8ce6ed766cfc3aa021380d9c0cbb30299748f6bd
SHA512ba8dfcb3b0235ee42f56a19cab5fcea062a8bdf3452394838fc3b24adf2183a86c1bc68be2ffc02f799a880d75f30242eb6e1dc826fb14040f56acc2d7740ced
-
Filesize
6KB
MD5747f9e58fa34c29a7b44a5f41490373d
SHA171dd383e216a82d8b7e6741e679d6f6975c02463
SHA2567ffbe95380af91c047c32a018c2359225c9be66378ad296da785e3b929a476f8
SHA512948c0deba1ebadb6ac5e0bc26873e165d54a3a1ad25a3323931f62b12ce83494c6e4082f825bb7e2712681ca2770d15fa2fb23a95cdaa2baf72e8038e87dd808
-
Filesize
6KB
MD55c67cef70886e65e8fa6415083ba5aeb
SHA1433de0f483291f70f279378366f321fb9a151e66
SHA256200d078989c4b021cbc3d6a241cd7cc258477859a4918c92045547313429a2de
SHA51291956163f5e3ca2b683a15e8aef955e2fae9af9464d778954fc5f6696b4000bebb3cf4ad2caf4afb04fc349f05dd6081f5107d3b9c4c90999d6c170b262cc63f
-
Filesize
6KB
MD5f792515930370811cb1fa27033fe31b7
SHA1730a809b2f055125072a716100997b1b38e3fab0
SHA256b0f125f8a37afbf67d96360412b5788ad6ed0530d2cb4527d742aa79e4ab8392
SHA51271133ad103f99f7b60b2a7271f05c2f029a5c90cbe40f1d705f1da3b81c5807f2f983a73f6b88a112ef4237642405a1df1394fb12d9621c0aa206d1b81089534
-
Filesize
6KB
MD5ca8f9817e5d8937ecf1f1f2b59630632
SHA140eea6c7835474939aa91a217940bbbc2a7b933a
SHA256127d7bdcd4b0c6ff78e1c35a36e306c6c15161dd4dbc85bcd3e39e888b9ad515
SHA51238ea746bc5296b99d331057d9b876102ae5dc68b6e435f41b390e9df6f645640657defc4c53c5422e645df46a2304bcd4e6a0ed953c3cda0aa03e674e4ec562e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\be84b22b-9de3-4e81-9cd5-03b69286b6bf.tmp
Filesize111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5d8a15b2c1045a4e8420fa2f87f6c47eb
SHA1ea36b0f67b788d0454b56ce632ef51bfd541c5e5
SHA25617ee24e869e5a25d2a8e4ca21d777053b9dbf44f705d60273e32052f71a8d973
SHA5126e6a63df9a6ccbb6d4faa409520b9f39cb91279a793ccccd4f97e1dcc4cc8900f8e52d3d6c2e8e36d0b6525c64050801f9af1b5153bd3f2a07c9d0bb428c837a
-
Filesize
11KB
MD5c4462684b13fff2d21b6d128613bbcdc
SHA187d39af56b25bda5f935ccab689c981fb52d36c4
SHA256c90cd905065155f5028626ec24cc50b8ece124a056f331ceeed18091af850205
SHA512f1c2fc62d561855c4d3113ea6000a9877daa5dc8fcf357bef89d78f7d8c1953f5ec416ca08c95e59373169d0336e42608c3abc6ef02bc6e1b5d4aaf384b247fb