Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 13:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.archiexpo.com/tracking/rest/external/v1/onboarding/tracking/myspace01?visitorToken=b83629e1eb6a30c783689f714f1995e23346e55d&target=https%3A%2F%2Fwww.archiexpo.com%2Fmyspace%2Fsecure%2Faccount
Resource
win10v2004-20240226-en
General
-
Target
https://www.archiexpo.com/tracking/rest/external/v1/onboarding/tracking/myspace01?visitorToken=b83629e1eb6a30c783689f714f1995e23346e55d&target=https%3A%2F%2Fwww.archiexpo.com%2Fmyspace%2Fsecure%2Faccount
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 5044 msedge.exe 5044 msedge.exe 2788 identity_helper.exe 2788 identity_helper.exe 5324 msedge.exe 5324 msedge.exe 5324 msedge.exe 5324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4656 5044 msedge.exe 88 PID 5044 wrote to memory of 4656 5044 msedge.exe 88 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 3784 5044 msedge.exe 89 PID 5044 wrote to memory of 4344 5044 msedge.exe 90 PID 5044 wrote to memory of 4344 5044 msedge.exe 90 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91 PID 5044 wrote to memory of 3372 5044 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.archiexpo.com/tracking/rest/external/v1/onboarding/tracking/myspace01?visitorToken=b83629e1eb6a30c783689f714f1995e23346e55d&target=https%3A%2F%2Fwww.archiexpo.com%2Fmyspace%2Fsecure%2Faccount1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0b2e46f8,0x7ffe0b2e4708,0x7ffe0b2e47182⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3064 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3720 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6374509848957647840,11029631816113112730,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD52b4609c55266605c4bcf851f9d38a562
SHA18d1a6e4b46719b272dee77d449b6ab4ff852c3b3
SHA256e6bc44dd1c0e3389ac5651ccd2db290dad05ed3c67824dc1c452c412cbe8bf81
SHA51230417ad06cc86f0c540356df8af687487f68789352c5b6a2fa96be83da210c870c522adfa6e1ea13849b73a3299a21b54732bb9c1d86e8c7986d6ef8be39ff61
-
Filesize
1KB
MD5d0329ab489451b8d4b6d58954d9d572b
SHA1a3d850922be0af6757ca53969058e836be0d85f3
SHA256eb8e0a06ec5d90b4f3f266f5a3237944f191962a91dce5e7eed0f1768d2bf7a5
SHA5129ae6209543d3fc081baa5aee2619f922ad1c9bd64beb9169d6d6f16c2c14e8aae94c16c24c6558df87218c576d623fe4a050da26e83b773684db9d3659d8f12b
-
Filesize
6KB
MD5e650b77d522dcd22b9853fa839e0c9ce
SHA172180282c78b6dc60f0e809447ebc6ef2e5cb2d9
SHA256d12cacb1d81db3c664f5b72108f4f61189bcb6baa63d597fa53fbe6674655d4d
SHA512a324c0f7778e42c540522f5ab8a6318704213d09c5060923949d1971c9473e2cba784737095da8b172aff9411c184abc9ccec6ab9c96c439ffe65cabd16e03a4
-
Filesize
6KB
MD59a7e95df450f9f1513ed8d84d5cea594
SHA19493c7af4f9addbc81a449a366dfa91626ed4a2a
SHA25694c5312e3ec46bc9ea12c809022690f742fc7414ff49fd0fbcd84c5fb6021ff3
SHA512b9aa0f6412f8dc35d9b8cc08b1edf3e2a297bf89380368194fb8f31e7c7fe6752e934f1c83fbe4c1845cb03e5b560d47602c4581642b3366f222b0b780170ee2
-
Filesize
369B
MD58570fed73f3bf83c923cc6407dd0def3
SHA16cd35e1f873faad99b1a581392678a9a86907cb6
SHA25684b10e325e0ab66fe630fe7d8d11cf94b38fc8cae06f6e385a75bf25493b7d03
SHA5123c82dff46bf66eb34cbd35579510cb098cbf6ce3c3136c2c16b90ffceec78af4c26d5f577896465187a937f89875b6c66c25653970e47f3285333ade526bc6e0
-
Filesize
870B
MD5971660edb14aa0732bd8b6690e1cb810
SHA1f0a82441bda7ed88fae856728ba6f68f97619d27
SHA25692a5990f3e57947bd4c9243ae7f4af304ad451afbf92b82a863629d3d7511b97
SHA5122c204a83293568b5a20d26084e733d75b97d5c57c647dde5f624d55c1ccc473837b113be481007824fb45d5c2412c975f6ae92e087d3ab36c3f590c46f9eabff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53da240239da235d087522b24f43121ed
SHA123cc735f25059f45cd868a7fac0391b941db342b
SHA256084363b76ca72770a7dc4164290471617aae4cf11445194d256ad83759406162
SHA512438033834469a95f783d4767be28999cf0f805f5b14e7d3e0dc1cf293ad4939ecdc4fd5c6c7d17a9b742745539f77c1e49d5d7638a2af8e976204d8dc5f0ac55