Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 10:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mcshort.link/_pVgIbG7qT5
Resource
win10v2004-20240226-en
General
-
Target
https://mcshort.link/_pVgIbG7qT5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 4468 msedge.exe 4468 msedge.exe 2624 identity_helper.exe 2624 identity_helper.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 1556 4468 msedge.exe 88 PID 4468 wrote to memory of 1556 4468 msedge.exe 88 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 8 4468 msedge.exe 89 PID 4468 wrote to memory of 3576 4468 msedge.exe 90 PID 4468 wrote to memory of 3576 4468 msedge.exe 90 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91 PID 4468 wrote to memory of 1792 4468 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mcshort.link/_pVgIbG7qT51⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe83646f8,0x7fffe8364708,0x7fffe83647182⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:82⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,8437522140439770624,11104887882484296661,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3664 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5bc368debdd6da180706c7a6c976e1f57
SHA160bdb27579aa2ce000b8fd50ffc5a91b5f6a6b8e
SHA256f365c2986f88784d027142f11218a12d4fd8941e02f4f0a1f5b6c9f2d3d20392
SHA51227fb8f5f9eed9b6a2d38267f7e08094f44c75330de757e98f8776d475ba5342123b896a1e01051dbcba88340d9e336392fcfa0ceb83affa8053d31bb935f6d0a
-
Filesize
273B
MD56788e4f6bae8b692a53200d2c7daaa21
SHA10b671a62ec6e693df05d4b3755fb98beb5dc22b6
SHA256da192d0af6bb7146a365fd7d78799e133dc2eb77b00f8d3d9643f67f054fa801
SHA512a40db6acc1bf8532e03ff4c60ae74d73e7dd586bf0cca9e6b9f576e98a37a190030d206f0dedbd9d735abb9abdee906b47757c7e38005738506496a50d7c9ac4
-
Filesize
6KB
MD5ff294aa8ae285b7268871518c2a0307e
SHA11e890dc852411f0ead72b2ca7798aea072d6b033
SHA256ac5f6ced429cd2c9258cb444d2d7be22c74909fc1f9c64aab5d70dc644440847
SHA5126182822dc51e285b5e3296ab27abc508f7a25a14b2b14e140fe7cfdc00ae45a1d350337e1f7eb0437c01a69bc526006e4bf7697d255c59e40b06bc45ff9616ee
-
Filesize
6KB
MD564285f55fcff67e1c9d7846422e9daad
SHA1025d0a70f850f65a439f5ec6f6ac94633855ae28
SHA256b5f4fc3b17959e7e25ee0b0d4ece0e9bf4e998b62a9274c4754d2e05fff0f6b5
SHA512c717c3fd5e275ec8cedf0a1495e5383b36c9f35ab5e914671c8a752ee78574c849b547130a889f9011640e99d06d3c421a84c5fe08dbdf5aa49a24ee3d4c9594
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ae5ad9f55206d49a21df41c7a00aff92
SHA1a3b6c873aa324e9ca0ce439e92101d9d8b1b9112
SHA2568fc33328ac7da746a7a691eb635e8eb7356ee4185c32bb06956890c797940778
SHA512f60e6462065dbfec62d1aed851aca09adc15e313bea5b4d7f8ed36f12c2527fa4ebb97af373fdf483fa81e78bb1547afafc2a4fecfe28917b2ed589a0bfc76af