Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 00:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://api.spently.com/api/spently/click?id=105133&store=hotelcollection&type=OI&cid=6272440696998&url=nemak-tech.com/minde/css/sdnfkjdhgkadshcafasuhgd/bjdyskhdufasa/jsfdkgfhsdafghjdsfisgfusdfdagfidhfsdgcuxgcjhdscghdsj/924/blk/ZGF2aWQubWFubkB0Y2VxLnRleGFzLmdvdg==
Resource
win10v2004-20240226-en
General
-
Target
https://api.spently.com/api/spently/click?id=105133&store=hotelcollection&type=OI&cid=6272440696998&url=nemak-tech.com/minde/css/sdnfkjdhgkadshcafasuhgd/bjdyskhdufasa/jsfdkgfhsdafghjdsfisgfusdfdagfidhfsdgcuxgcjhdscghdsj/924/blk/ZGF2aWQubWFubkB0Y2VxLnRleGFzLmdvdg==
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 28 cloudflare-ipfs.com 29 cloudflare-ipfs.com 30 cloudflare-ipfs.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4216 msedge.exe 4216 msedge.exe 1204 identity_helper.exe 1204 identity_helper.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 4472 4216 msedge.exe 88 PID 4216 wrote to memory of 4472 4216 msedge.exe 88 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 2844 4216 msedge.exe 89 PID 4216 wrote to memory of 4496 4216 msedge.exe 90 PID 4216 wrote to memory of 4496 4216 msedge.exe 90 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91 PID 4216 wrote to memory of 1940 4216 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://api.spently.com/api/spently/click?id=105133&store=hotelcollection&type=OI&cid=6272440696998&url=nemak-tech.com/minde/css/sdnfkjdhgkadshcafasuhgd/bjdyskhdufasa/jsfdkgfhsdafghjdsfisgfusdfdagfidhfsdgcuxgcjhdscghdsj/924/blk/ZGF2aWQubWFubkB0Y2VxLnRleGFzLmdvdg==1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf38846f8,0x7ffdf3884708,0x7ffdf38847182⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3312 /prefetch:82⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14810777263056758146,17190228949880295040,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1e97dbff-b275-4f2c-85a6-d3c8f0da1add.tmp
Filesize6KB
MD5f8f88edb49a2c9d05aa990cfbc86d0a3
SHA1e285d7a95c285963e9160fe63e300d954e1f51c0
SHA256c6d18896fe241e450ff0abcdc49ad17d74e27b4565cace7dbff1d533ab3257d1
SHA512cd2d1ff445c9613927de90e17814de801fe5db9545af016f19745a30442a2316bc21c3cc07bb1a7279f9a85d946b34de5c2861cb7434886911909254b718e0ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD56be8129305d9ca13ef9fc31fdec77a50
SHA12d66fec7a2fe08af35351c5c3144e0dc79cae31f
SHA2561109c68501157ee73c677c626e3f22e51f0857a5b3c255f2b89937ff3ac5e3e4
SHA51294fefed1827b4c5a7dd52c1b55096cf64fc5d11e8b2d44b699f74a072212a92fc6f84e8aa982c69ad3a0f5879632ca9c679de940bac37c8824d79714e3e9766d
-
Filesize
813B
MD52b09e4c0f87943537384998315710a15
SHA1771876d88331d20beb1b7e3ff92ec9e4442bf154
SHA2560584b9b8bcbb79b44fa2e7f1ddce561ae0f6b6965636306a3dcdd4861d895a73
SHA512b758517664f2b251d54ee9291b28c9d4b4b9cf95f7dfb95b95ad830a65f08f31e7d594b480377012035139ff006bd69635620f3b0207b4962b665c906b0c8d16
-
Filesize
6KB
MD5df927538f6a81074ecfe3d0a34ae801c
SHA12554c8605ae959e54959f96ec210e2de3e5cbfa6
SHA256b6a12fa33a97d93e8735e42a35543aca9215000101107c99234defda1ba3ded6
SHA512252b64896da77354ab2855a9d339260969611e28543417b6221a235aa554a70110b151cbad107efeec819a50a3f3bc591c0076c28db168209d13304024f95ab6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5252ce3b5a6ecaa98fd52edf76af6db8c
SHA1755ec815e29b3a7bab16078a3581362761825ab7
SHA2566ef7a89650e87aca25a81349590b7f270918904ddb5e25e5c38782000de7b9b5
SHA51240fb453427e72011e937c8d677a6f0db798e2139d39873b1e8a77f1f98beed1703de21eef9467a9c42cf9b16bfde73db8871dcfdde87eebfe5ae682633fd30c2
-
Filesize
11KB
MD50fae38992c227df5b56896019d906462
SHA18feff74f6869b38107844f41103a2ee1b7eec36b
SHA256ea34dd5978973e5bdf9834871f39ba6d60b0118582991123252b53a05cc9d1fa
SHA51296fb41879451051eae5dffc89386da7785cd4d93cfd03f4024ce123f5469fa4d73b1df9615f52b6565346d388e6f3b87831929bcef974c37a745732bedef8dfd