Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 08:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://9iuknl.t90cb.com/u5BghlCXTe/
Resource
win10v2004-20240226-en
General
-
Target
https://9iuknl.t90cb.com/u5BghlCXTe/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 2468 msedge.exe 2468 msedge.exe 4952 identity_helper.exe 4952 identity_helper.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1056 2468 msedge.exe 66 PID 2468 wrote to memory of 1056 2468 msedge.exe 66 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 3904 2468 msedge.exe 87 PID 2468 wrote to memory of 2012 2468 msedge.exe 89 PID 2468 wrote to memory of 2012 2468 msedge.exe 89 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88 PID 2468 wrote to memory of 2768 2468 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://9iuknl.t90cb.com/u5BghlCXTe/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb62046f8,0x7ffcb6204708,0x7ffcb62047182⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2520 /prefetch:82⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3712 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12185456904847082817,9448513710165995751,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
618B
MD5e5d324f1896df8f30302905656780f3f
SHA1863fb6d74f79f8a5b4d2e7f7e0239d6339ecf9ad
SHA25617681a90711f040c2c969ab1a04746632a042abb7adc1b51245c9ad4e7423513
SHA512488ea6299ffd56ed2883061c861151e60ce8c942cb33e4c845faa8131174ca175ebede5aeb497e7815027bb91a8ed85c9af437aaee1a319b7051eefe77f4d1de
-
Filesize
6KB
MD5fb8b357463f0885ee33c3897a3e7deb6
SHA120bda51f056bddb07e6200a7d606d502f1cd0b94
SHA256c017f65a8a74e70bf307400168c6d59f8936109a5c1911596a32775d0dbc9e29
SHA51244054a636e42f75fc6da1786c647b595b987d8b395917e66100ada124a0f172d11467d7615ca6118e82b3d683bd297335c5619ad2f0dedf355c1526a82a8dd1f
-
Filesize
6KB
MD5480271511ddd7b3ecff7db6010773dea
SHA146132d51af3458fdbb0af8afcbb5070beba5c340
SHA2562b3bd872dabbdcf9934ec67d47ce15c967284811ded86545b5ab6b0e110d3149
SHA512453c10787fcaf3dcec55030022d9b57a51aad27d8fe3ade1e3af1dc18fff3a4a54fa9c3d2bcf8b70e86236c82e826f27b6162d62f406abb0f092cfe342858824
-
Filesize
6KB
MD5c37d170c2a76b63a5fe522fab8af0e7b
SHA1ff7274cfc8120418a6cad134dd316553cdc178cd
SHA2565134ddc0322783858a78a5dcdd87fc422304d4581db1d6f534a579e5bb0fc40c
SHA512826908a258b0954f74c1ee53cdea3122abee4a8bd258b639c128c15acd1570ad23d9e651c2da8edc7d39dcc7500dace5437ef51405394957474abdd50d9eace6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e3e7e8f29fcb1cd2666a05efb6d0f090
SHA1f8d61446014ec2478f9624cfb4760968b73cbecb
SHA25626ee843f74161073f272a7a77b96d008eec63c5f51924fe3c8fc189732d1cde6
SHA5123e53e330907e27bc982827d8383abb8851dede2926899536a31a2c4d810771cee23c5feadaab95cec0f1f3536c0c4b0e59876b709cb3dee2afb1fa2d6a5b7bc4