Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
71s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 02:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1210766749759443054/1216077649081008299/modderXdisableassupdate.dll?ex=65ff1391&is=65ec9e91&hm=78aa70e2fb767292f18f366406876ab8b400de7b6458b1d40cf9a6252f95ed25&
Resource
win10v2004-20240226-en
General
-
Target
https://cdn.discordapp.com/attachments/1210766749759443054/1216077649081008299/modderXdisableassupdate.dll?ex=65ff1391&is=65ec9e91&hm=78aa70e2fb767292f18f366406876ab8b400de7b6458b1d40cf9a6252f95ed25&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 119633.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 3432 msedge.exe 3432 msedge.exe 4312 identity_helper.exe 4312 identity_helper.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3432 wrote to memory of 4676 3432 msedge.exe 87 PID 3432 wrote to memory of 4676 3432 msedge.exe 87 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 3956 3432 msedge.exe 88 PID 3432 wrote to memory of 1648 3432 msedge.exe 89 PID 3432 wrote to memory of 1648 3432 msedge.exe 89 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90 PID 3432 wrote to memory of 3148 3432 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1210766749759443054/1216077649081008299/modderXdisableassupdate.dll?ex=65ff1391&is=65ec9e91&hm=78aa70e2fb767292f18f366406876ab8b400de7b6458b1d40cf9a6252f95ed25&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb43e946f8,0x7ffb43e94708,0x7ffb43e947182⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4496 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5672 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,4126095574679911329,9726547872940732926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5dad9ba4f0bc520d1bcb63d716ae8d469
SHA19c5abed53438fc37f77b443bc8fa1da5b933d413
SHA256834a3b8761ec5efc2d8a177971be08d3cc44dfb66f6ecb901e65854c64613608
SHA512a6a1a6bb5d93db3df0c6830cb599bb9b64b2f3c9449f44dd1bcec88fb93464e6470d7e666606fda6adbea5da425b2ab4a4b3922c8d7517b79e89bd0ab6a0906f
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
6KB
MD5503187fcad737b144178397accaf9a3e
SHA119fcabcbc3014665e961cfb13c34d1e3331d6578
SHA256e1d46cae7c890beba9d412a5bbd18aa51aec8f30a5ac0a167ed16b91b839688f
SHA5120ede8112e5a33b20be99023804397c6159294dc01270bd2892a23f67700e378a456dd804b14c3f983a26f209dd913d8151c88cd90970442c3ef6bac01c8c8d1f
-
Filesize
6KB
MD5d0ccf536a3835255cba21566613b0a2f
SHA1ee51ac99c4b8b76575f3cd3fc08f57a1724e1767
SHA25635ff624181740af67358016fbcb9f515b54e6f532950d3d3761d16770eaa372b
SHA512653c517e5b5b584fdb9fa55db3fd02240e97527d7a45febb3335d2e6e82f041416f94a25cb4e3530d64d55c21f88061101f108adff7cdc73695dded36f76bd3c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD550413652ddab9cae7990d85257f0fa80
SHA12c6b2d588a8598339be02faf59ead43526c5634a
SHA256d4fda35592641c1da667c992592df23929858d88863d6f408f93f779b7179ddc
SHA5120255d1db00b1647725b99331bf589118e3cfd8273010975984c04daed9f73df96c9ca4d6cdb9fab3ec02b8e32a9019b27730e817e88d99410da014226743e7fd
-
Filesize
11KB
MD5f43c992e41609cbec2afc09eaf0b97a0
SHA125c0e01f6ac6d79cf7f75bf038e6fdf1e5f24cba
SHA2562db5692dab5a5de0f2cbdc9e23146367ccd00a645b5dd07ff474e3f26969c1f1
SHA5126a33f44f2807ddfad9556460ad68a35cba1f8b998340520e5103fbc7f1c0b8298896d7f5e7a10fbcf95f2210fb9e5558738392cab96f557a1a5cd4fa1552b4c0
-
Filesize
52KB
MD5fb804c876c8c478b741471c0385a576b
SHA10eb992bb6f8d8c9dbcbff4278d069f0a949c884f
SHA2564a41a5ce046ccae25f601d536e750c5ac0e351e1e4b882e9cbd37ba05f3c0bda
SHA512c178e36e7468c2cc124d39f7fa72cb0fbc59b58c21c851d8c45d5c0bf64e9b98b6f00db813a53f6c2b078f055cd2fa85227b830e2d7cb09471d987f31cef326a