Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 10:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s3.ap-southeast-2.amazonaws.com/cdn.fxdms.com/Telexcopy.pdf.jar
Resource
win10v2004-20240226-en
General
-
Target
https://s3.ap-southeast-2.amazonaws.com/cdn.fxdms.com/Telexcopy.pdf.jar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 708 msedge.exe 708 msedge.exe 4444 identity_helper.exe 4444 identity_helper.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 708 wrote to memory of 464 708 msedge.exe 83 PID 708 wrote to memory of 464 708 msedge.exe 83 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 4020 708 msedge.exe 89 PID 708 wrote to memory of 2396 708 msedge.exe 90 PID 708 wrote to memory of 2396 708 msedge.exe 90 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91 PID 708 wrote to memory of 4744 708 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://s3.ap-southeast-2.amazonaws.com/cdn.fxdms.com/Telexcopy.pdf.jar1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8127f46f8,0x7ff8127f4708,0x7ff8127f47182⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,14108977447801387531,6440612394075236164,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
6KB
MD574661fbfe55d6f9423b8e6c674df88d9
SHA18cf5bbfe47faef47251176d5da0be67d23b27b05
SHA256a716e80674e69dc5241dac8bf170f4d6e2a6cc2bbc58e503f1ad64573e5a7936
SHA512e2cb8bf52410995e4fb66377048f2197f85c945ac87c6cc208e98142875e8e483d3c9e67fdca5e3698b55b437da9fadc84eaac234a7d4d37176fdad87eba8838
-
Filesize
6KB
MD5fc37a9c772d7a7e06855df902c7a277d
SHA1d21d7807e1d15b5d9f240a49a2532123129e00d1
SHA2567116302ccbf0531f66ab32b51045ee8d74057fc96af01716e20cb400ebb5a479
SHA5120498136fa7f0aea27fe17949df199b905eac5818012f89e03da005ed4c81aa2bff4ebe15d9651fd34442ad40621f5d96e797e6edaeb7b49b3ff6059a8bcbcf06
-
Filesize
6KB
MD500fbbcfc0d1961ab20c14acda2276d87
SHA187830a8f206aa1c57f2c90be920ba18ca9fe0bdf
SHA256f6dab6929211d931b3bd3838ef64980f7b43433fcddf45b1df4dc4c012fa017d
SHA5120e81b57e5a94a00b585be0cf3842f4e85646941ea9fff7caa0a5cce0b23f779a0ad890cbc2128374c166166c2d056a1b35348349c2d05d4de51c877d68a26fb7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58da95aed66f1e4d9edbc44aa106395cf
SHA1e76b4d8d58d623725a01d90831b31997484fa782
SHA256e44127f1cb1c143f34f38191b8312b95aa53fb6b5089f47d976805669a951539
SHA512cc3b51909f5e0ed2c23624fac9e1183194db8fa3de47a5c40ceaf6f391ee4eb28a36a04df65333ba77740cd1cf881bc989c98e4ea51cf50e0e2e53cc946894fb
-
Filesize
8KB
MD539b32821fff54f17ec4623850ede00f7
SHA1c257cb1c38d2695aceaae6d29d70a0f26af1f01a
SHA25670c64ae08aee45bace038ff0b1591719246b76fa7d1ce64ce280580c83ebccf1
SHA512c679fca641a0fc328eb58a38b27a221819847db119864a3170e8843593661b3797377821db1c1f4f4165a917909dfc9e76b784ad125c2fa404724647644727a1