Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1680s -
max time network
1686s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/03/2024, 14:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://elhacker.info
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
https://elhacker.info
Resource
win11-20240221-en
General
-
Target
https://elhacker.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 484 msedge.exe 484 msedge.exe 5092 msedge.exe 5092 msedge.exe 8 msedge.exe 8 msedge.exe 4100 identity_helper.exe 4100 identity_helper.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 3052 5092 msedge.exe 79 PID 5092 wrote to memory of 3052 5092 msedge.exe 79 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 1700 5092 msedge.exe 80 PID 5092 wrote to memory of 484 5092 msedge.exe 81 PID 5092 wrote to memory of 484 5092 msedge.exe 81 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82 PID 5092 wrote to memory of 4928 5092 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://elhacker.info1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa093f3cb8,0x7ffa093f3cc8,0x7ffa093f3cd82⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,11313314918595982013,15514483526736471192,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD596899614360333c9904499393c6e3d75
SHA1bbfa17cf8df01c266323965735f00f0e9e04cd34
SHA256486e4b4bb11f664c91c675e73cfeabe53b5009ae719459813be17814cd97e43c
SHA512974735b40a9f92b40a37a698f7f333590f32ff45633c6e619500e74ec274bc20bf7dbc830b1685777b714d37a3ca103d741ee056f4ff45ef08c07b38a7895df7
-
Filesize
152B
MD519a8bcb40a17253313345edd2a0da1e7
SHA186fac74b5bbc59e910248caebd1176a48a46d72e
SHA256b8024fbed11683ef4b53f5afac0ff691025b7eecca0f6a95737da1585558227e
SHA5129f8780f49d30aad01b28189804329aeca6ad2b7ffb6be505d40bb1af7802bb62622f518cb1c43a5815bbbb46638f6c52aead3d68f14fa957d18157edb42e95c0
-
Filesize
181B
MD57180776771f438e7a2cf6b9e42f070f5
SHA19c56871609c350d0994dcfdd3b9fcd6fb67d2756
SHA256a6f162093c450f17ef03d40db4f011fed5a22365e12f7bff2935d75a7c405995
SHA512fbdb895acb9549faf1a67768c3d48c54b5e49e913d3270df163ea18b2ce242373b43cbfc2d95a731859d1ecebc820fd4bad7f1207690cf8904af497dbc55e9f3
-
Filesize
5KB
MD59592c02a9c712a87698cc8ecb010e793
SHA1ff847d03196e4f395897c3021b9ee4d4eefaea0a
SHA256eafa8a5568fbdc6d5c34f9950904d721992f3922018a10a23d727b9faa366e77
SHA512843ff161ed9994936fa58cf86d39e4556a9ce631c8f69f4eb25a9f4932e7ee3d4d2d1306a96ddfbbe10523bee1356ea056539a3ac34a6f40bdb0ff515cab8734
-
Filesize
6KB
MD5fe48ead57156619d7f55387c3ea1115d
SHA1fba82f78a2ac62bef4b68119c9d84485485004d1
SHA25605ae92fb8f0756259d348c77bdf7a61cadbbf70efc32da74055020ad104ffc06
SHA512dd88442a584919e852847d49a4d63526ebabd344fe5467667a3b0b5b32ff566103b5dd464adfaecd83ec18311134172c71da77833c250e071772f5d98e715a32
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fd2c9aa381f4a3056194f2c5d74a6ff6
SHA120cb07426d7e06315da3e3f803e27931244b93cb
SHA256293f2892aedc05dbbf78d8b1810115486b5e537e2d6141f146ae8424be5a09a6
SHA5121eb74a5aa8284f788b1ed2ef1671dad553a8c135a4040d437fad75f44e61bcb14ac6acc18919624788b4d202df569433bb258a98bc94231572debed68cc92b42