Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 21:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bit.ly/ngcSMS
Resource
win10v2004-20240226-en
General
-
Target
http://bit.ly/ngcSMS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3896 msedge.exe 3896 msedge.exe 4372 identity_helper.exe 4372 identity_helper.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 2488 3896 msedge.exe 88 PID 3896 wrote to memory of 2488 3896 msedge.exe 88 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 4876 3896 msedge.exe 89 PID 3896 wrote to memory of 3692 3896 msedge.exe 90 PID 3896 wrote to memory of 3692 3896 msedge.exe 90 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91 PID 3896 wrote to memory of 3888 3896 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bit.ly/ngcSMS1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff983cb46f8,0x7ff983cb4708,0x7ff983cb47182⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9314012820288691131,2610322527691273322,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5a518e6ecca0cd9f05e4e47393230561b
SHA1b8ad0f9b552a5857e44c3a5c09be9290bf85ef8d
SHA256e68dbf9a1f6771c3f0e144dc476075eab90e4fe43d2c69f7a9d2c6200ffc3428
SHA5128359bbdd8c46f703e24fae24edd55adf7ab187d52d922895683b004ab6019ad1f0bc99e810ec5dec323b3650ad4c469dd7b95249b0e6afbab06512c25c8ce0ec
-
Filesize
184B
MD525465b15b7154c9e177a64ff47c53d9b
SHA1989170c2af990e76642d8e40203ec8e4aa9c6034
SHA256a4f52834957d6aca6e8014a47ef0528112d6cf31ea100d0fa7103775ea6ceb91
SHA51257edeab61b3ce7e445d1eae762ec504f343ce9d8b87d88e1864c4c0815cd87e59b0e0434314b693fa79cad7ae32184cd6975081f83622d8fcbccfe272ac83e7e
-
Filesize
6KB
MD5afa62a0793d4454cc66237115d1dbaeb
SHA1204aae5d6a115b45300c8db1a031116a853abff7
SHA256d7dc9c81667ea50ac43f7b09e698b2fca6ca9ae9b3b8e04555f7c04bd4e1cffd
SHA51236666d2b19da49417f02c88154a7eb5059f1db4379d7b5899d064d3c1263763eda0e6e13c33279f7fe74d71df2ead26ca861ce8004ad3466b0b62efb74f607c2
-
Filesize
6KB
MD55322a76220820599cd692bb87e5ccd2d
SHA1af1536ab21d2d3a9e36f44ac1599fbd0150ac555
SHA25632eb96b1cc319bd0da5ebf911b053dc00431d78a931ad3a83fe4323440235213
SHA51231bd24b4f319e8d7984d963f2217221d3c4ec79851ae5d27dee8eb0e898688b52ca9b4e4b6ce4ce8f933dc10b0ad75a2d891f11e00f7c7a235a8f3a009179087
-
Filesize
201B
MD5abf82858cd734766aab7f35a918d4330
SHA152bac608f168624083813f9cebf1fa2e219fc41f
SHA256fe9fc39a2758a11be8398d225a05ce075a16a2df87ebe0ab78153ea3b36639dd
SHA512ce1328f4a3e2b99af7fcb69f2b9d2c5023cbcbf7ca9c169536c22aab7162bd6173bf389f1f0586128d2458de60fd8585b7b62f55aa03f3185b70ba3cdd71ca9a
-
Filesize
203B
MD52c4ec1fbe3eacc22a4987f803d582a59
SHA1da32832c0066df4d9bba3a8c48af2f81638d62a4
SHA256092fa9b96740023f94dd4246d9263f3ed17b1ff9e09acf7061ea202b8144894a
SHA51284dd6302c63b5a1ee46516eb6e16520313a26a0ff84bd061faff5383d040cd9fc625a924a314519e5e452ec3e03874eea76dc9b6e6c3b4e4eb6c98182bd77244
-
Filesize
201B
MD501da9cb4aa52508e0665ba198d018f6f
SHA10aaec3aacdef735a2c9e71c09c230912ee6f2f0e
SHA256c64bb04025e70c094767cd820c914d1d5764efc7fbec38890cb5c3ace215380f
SHA512a4764724593856ee23ae468f950c743d5935924857fc413e90076776c5b85eade05b29cda4af8c7b11d41c843461cbc2aabbc7cf948a8662740fc8979a373604
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57c3b7e6afe15c0843adc2bf5b394825a
SHA1d1f86bc0671b36c1d0a8ba271f74958ff8a41364
SHA256f4ece3f5592e2057888547e0532d03ff38528fe665735d6f20387c14d9d1aa55
SHA512e05ca3d056619bc4b1861869ffbe8fc836cf2aafdc761e08aa9d360735bace99ccc0ca616d425c5e61ccf7df2795c893c1249849429d49abdc70f139b16582d2