Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
480s -
max time network
600s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/03/2024, 14:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://hoo.be/maddiepricelol
Resource
win11-20240221-en
General
-
Target
http://hoo.be/maddiepricelol
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 3544 msedge.exe 3544 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 536 msedge.exe 536 msedge.exe 4500 identity_helper.exe 4500 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4396 3544 msedge.exe 81 PID 3544 wrote to memory of 4396 3544 msedge.exe 81 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 1796 3544 msedge.exe 82 PID 3544 wrote to memory of 5048 3544 msedge.exe 83 PID 3544 wrote to memory of 5048 3544 msedge.exe 83 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84 PID 3544 wrote to memory of 3760 3544 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://hoo.be/maddiepricelol1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffb39ec3cb8,0x7ffb39ec3cc8,0x7ffb39ec3cd82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8100919925922568057,3409102980022215555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:2260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53b1e59e67b947d63336fe9c8a1a5cebc
SHA15dc7146555c05d8eb1c9680b1b5c98537dd19b91
SHA2567fccd8c81f41a2684315ad9c86ef0861ecf1f2bf5d13050f760f52aef9b4a263
SHA5122d9b8f574f7f669c109f7e0d9714b84798e07966341a0200baac01ed5939b611c7ff75bf1978fe06e37e813df277b092ba68051fae9ba997fd529962e2e5d7b0
-
Filesize
152B
MD50e10a8550dceecf34b33a98b85d5fa0b
SHA1357ed761cbff74e7f3f75cd15074b4f7f3bcdce0
SHA2565694744f7e6c49068383af6569df880eed386f56062933708c8716f4221cac61
SHA512fe6815e41c7643ddb7755cc542d478814f47acea5339df0b5265d9969d02c59ece6fc61150c6c75de3f4f59b052bc2a4f58a14caa3675daeb67955b4dc416d3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\08b57c82-e8f4-4ceb-8843-bcf06f1dcce7.tmp
Filesize5KB
MD5c1df34b37f507e5e52b113138b4d21ef
SHA131d0ede79e2cbacdda1444c33f26dfbfcfaed3b8
SHA2563bd7f4848a55741a3bceab6d2a1149d88523eaf0b407fe496b9473ed91fde1ac
SHA5121de54074dc9f77b3c9a647bc0ed2ea4a28f7f5f642dd77aebd2962d0f024aa867a42b5b9f8be49cec64932c074bdc436d4cbca8e3c10e6a61a2261c772ac9d7a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD5d7f67fce2f3989d467b856a3caab6a3a
SHA1ce40f0b13a13a4e20aa5750074ef69b865b331d6
SHA25698ea2acc5199039c31011718a35bd0f77117bbb87e5698ad181796b8f3e13ed1
SHA51260827e03a497a6829f09ff7a82a3ae4ad7ac7446dc53079345d294761a472703b16cb2cd9c081e6c28136d2b76cf10719a68bd21d4494836dbaafb9f35ae30a1
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
975B
MD508812a0e7e1f604d3d216a5ce5b77471
SHA1fcec4b59a49f3fa8d6aa976594205130c8703a37
SHA2567916d7342c4633bfe95684fb37433d63ff03e03b23422e3ed87c4584d31c6836
SHA51288fec28a6b840e8a23aae6221bc5f4acc515bf3d8b4bfd3607a85b0b566c849d78e8c4cac9e8db76914cf0e2d96628f66afb24c1c6736df64f150620c5291370
-
Filesize
5KB
MD53a25aa967309555ce89b283c82129f8c
SHA109f9a26d7188c6187e9862c844807177c952b7f0
SHA256f7fe20368fbcfac8cf4ea749606d0cf0e074f7b57628688394b825f42773ba8f
SHA512e12a69d5f4d4fb2e304d2187bef7dec585eed01e1ba57f8d735b111ae0ea891a7cfe7d8785107a39cbab4734c732d825338b698f35b72a53e32bc3da54d730fe
-
Filesize
6KB
MD5478fad1580ee0752421593b6dc9bf1a1
SHA1333dafb5b23e900c297ee5c83301165cb06fcf79
SHA256f149c610aa21e023d47b4f16e4e3ebcf616ef80cd61535c1044a356a8d35b651
SHA512dfb159bbd795a7364f7e071043f21a42845417a9e4f79cdbed3f470c25b0a472284d6c949ff567716175a2ee27e015a9ff123e3a9e5ed83a133fc31b552b9dae
-
Filesize
705B
MD543d9a1d2d436db3a6198a537a219cdd9
SHA18028227edfc3fe78b4da9766d4186c9ab559a38e
SHA256e59ae637c720aba3aa6f11777edddb1f129ed3eb1a32492d98171485fdfd1723
SHA512856b1b754b347c519987bff55f73a88cff308146196ae957f54d2c177b6772758d88b3381fdeae41879e930ef6b5e20402801582173f83102b4c71523f84a720
-
Filesize
538B
MD5a8fbb086d260c85b277446552c3366fb
SHA1dcb270505450d8d69acc4d5ec9d68b6abf00efc3
SHA25663b169e7b4a911ba9b94405ec4f3a79b2780c1bf747d69d71c4a267690422d24
SHA51274a5fe3e1d4a63d2e32dc01e6f4cfbd33be29350a68ebad3966692993aa6a13ce536fcd3fb448dda48b1dbe8b43f57a33cc39b7cca3a67566619e6377cb189ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5e9fb4da4337637fbbccbd66192cc4b75
SHA1276a47e83ba53cd4e0c8a065fa0aa994193af7e9
SHA256d5dd45cc62e414c095a207939fb10241faefba21abe2aa99552e76838b94c379
SHA512c4fd8046033a0a4b391dd2e0473db7ecbe67d3965aeecec5b8795eadc599bb694c49438d8072580949479b93f249e2224d332103599af7d04e114fa30635c82a