Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 20:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3wUHiTO
Resource
win10v2004-20240226-en
General
-
Target
https://bit.ly/3wUHiTO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 3968 msedge.exe 3968 msedge.exe 2284 identity_helper.exe 2284 identity_helper.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe 2884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 3760 3968 msedge.exe 89 PID 3968 wrote to memory of 3760 3968 msedge.exe 89 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 3356 3968 msedge.exe 91 PID 3968 wrote to memory of 4020 3968 msedge.exe 92 PID 3968 wrote to memory of 4020 3968 msedge.exe 92 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93 PID 3968 wrote to memory of 2828 3968 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bit.ly/3wUHiTO1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeac6646f8,0x7ffeac664708,0x7ffeac6647182⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4376 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8684806975074037164,14112301650294938800,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1492 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD54a74ea220532386fd4d574c4748c64ea
SHA1ddf2fe9354bb7f97d95ad5790d2a05ddb096e4bf
SHA256af27d22c09800be08406f194d2477d73ca9cd73749884986a8bd801df3a9c5d4
SHA5123c72c8f9f816756a5b47f41db0fe0cc06503d518bb859d001f5be297289ee327eba3865981f5530909ffc33f1891d3ffba6ad3e5374c9a8512c0a4fc15f0e966
-
Filesize
358B
MD5591ff4aef921491aba2c91ad094fc41a
SHA1d031c8be51d1169cdcbc411655ebe2bd6aa00814
SHA25689432619b2640bec220ec427d2b3b661cfcd08e2cef5515448d8baca2bdf489b
SHA5120e4e93127a9b05ccbdd6ca65176ce17a8b1d6b8c3e1478b0431036065b9de6c76ba0dcc5e654dc63eb2f95c430cf514598858b52cc8ba6e882a052da008dec8b
-
Filesize
6KB
MD56fcd06499dd7fd56bd0e8fff49ae60ea
SHA1b4ccc7f44796473fcba3231302cb7d8b87a630ca
SHA256c289dae5a82d9cef17d2acca61241f231bbddf622905edfb0dee2064d7e8d4e4
SHA5125f785d23976c3327e84758ad993e594fcf4cec7f99b95d3125e9bf764a3d713917bc6bbeb471acc907c1226196b23b50a62e05a239b1adf0c8d8536cc11b3011
-
Filesize
6KB
MD569b86bf45f18643f120764ec1af7f5e0
SHA1968412b2d7ae53610a33c1ca62c5025ff874d9fe
SHA256b1e325b95a510cd7c79348df43fb46ca97f0c72c8646b5540c032494ad56fddc
SHA5125ca0879542e9b863719cc8e9593c42b4c89c0578d560dd45b7298569daa0bbbfddf1f0dcde843da261a5802b17021d6e89d5185be9a965f7b5520eb0251cd4e9
-
Filesize
370B
MD50c680508b6e40dcd713260c2970dc594
SHA1b6924605a8f91aa4b791152011c207306833206f
SHA256c52607a35ac2033807a49874263981641592527fece03c31753d6d725f32d846
SHA5120c5a803bd942f54c5e102e1e9c24acd9680de64257f6f0ffde57f4ab46c1f20590b68a6de807e7488acf788bdc38b0d194f56ff8d0eaf886cf192c8197f4b80e
-
Filesize
370B
MD50e583bd0d1fcc94539545ddd940c7b01
SHA10c60e114bf8f295ef6936541e70b1201a02d6702
SHA256537284bcd2ed741563fcdf9bbbbd057b9d3921e4e9e0d1489ca3e6264478702d
SHA512b40c4755fed741579b9ac8d47caa258e06470bfb020f2020e8ad26f564fd2dd88c434fc449754b104f6d77c2d1abf11616d2a0f7fc1d870d91aed34b32220765
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bc8b616bd9c16947109c29fe5e9fac04
SHA1df1fcb63c37c9dd11c738a7048b702350c5cdcfc
SHA2568648e994ce63c9d314d9d79c19a1848e4c947b9a4a5b36f02c9caf18a7ba7093
SHA512ff500e520fbd6d16f15a03f72cfd3945d5ef235386c485bc0c549d19f527ffdf98548f4d2c70458ded602b7ee89441b5e594917d212f35e44d3716d9341f9075