Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 13:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wa.me/message/QBOGGKVNIJYQF1
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
https://wa.me/message/QBOGGKVNIJYQF1
Resource
win11-20240221-en
General
-
Target
https://wa.me/message/QBOGGKVNIJYQF1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 232 msedge.exe 232 msedge.exe 4504 msedge.exe 4504 msedge.exe 2256 identity_helper.exe 2256 identity_helper.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 2356 4504 msedge.exe 88 PID 4504 wrote to memory of 2356 4504 msedge.exe 88 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 3340 4504 msedge.exe 89 PID 4504 wrote to memory of 232 4504 msedge.exe 90 PID 4504 wrote to memory of 232 4504 msedge.exe 90 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91 PID 4504 wrote to memory of 1688 4504 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://wa.me/message/QBOGGKVNIJYQF11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe87b846f8,0x7ffe87b84708,0x7ffe87b847182⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14455962481299625545,13162840459456368578,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD576ef84ad7504bf51ca7f9797e12c8d78
SHA136aafbbae8e0a5ad40d56912c9b7346a5d7e43aa
SHA2567aeaaf3245b43487d76f0e88f27707509bf4ec3481c3b6ff6b4d8e3266dd7e36
SHA5121ef34ad8e10211d404f96b09683db1d46589038f5c446f751a9e2a01cc9b43921009d970929227dd6304b181056e382d7561112ca6fc22a995d2cc81460344fe
-
Filesize
173B
MD5b1aec192316e2bb2832d30893c4825f4
SHA1bb3929786bdc5de22095c96964d1c50d9fdb0929
SHA256d037bf54952472c61305b3945b78fe94378c53f0d56436ec30782b148c63e813
SHA512fa32dcbf25c1458568b1f368a9ba03682ce2b1b43766fe9f48584314907252400e971c3793f817c80f299d3e46119a07932464c514a933e7f20bffb75f979e3f
-
Filesize
6KB
MD5ac9dec35cbb311c552634926dad02310
SHA12783833ba63af7c30bd000ea28819869f37b5353
SHA256040af0f553492c87b89c1e90439ba2169710d6177f66e6251e7a8b275438a69f
SHA512385a16a4dfb6819e70e8079ffed83e150bce4c31c6a9521afa4e68281335e4087ca5b4522d77ffa4b4d696d71c69cfb035b6bbe41e5c3077801733ce5489cf27
-
Filesize
6KB
MD59dc82a5ad1885feb0e0c831ae45cda42
SHA166e9d5f01b9843371be997073a64c3765c2a0d1e
SHA2561b2e363a744c8f8b71c369d96c83dddd0c8d7c6fae3649fdc11ad7a00b649d85
SHA5120d23aa984a12a5ef52a5a6d09dfa4b81704ab36c65116da68432e9cbb71ce55121db24d2b226572686ece983c8bda7a06bcefa7f141492079d76bac961f3912c
-
Filesize
370B
MD5b2444558eb312907638da179bd060e98
SHA130cc88c265665222647fc9f6569fb7eed4f83376
SHA256ce462f90cb56061d96b072e67db1c5eca6dd7dee8705a652f1e227770aeaaee2
SHA5124415a2db2046bd7e4a19a4454b14b7480b6fc8f213bc0a6597aee4954187e0c3794ed27ca521d4fa50371c1ea1b2d20342337c4e0d375460370e8c7e057cbd82
-
Filesize
370B
MD53b41e745d1c030efe51359b4dbd37244
SHA12b995812f2ab1286b7bb610a1fe4df347c7d4ef2
SHA25637b72f2ce8e5fb70d2933cd887f461c14d2fa11333e687954c954d5fe789f8f6
SHA512e0904181064aa730975cba2cb5fbd5b6fd9d806e47dcdf06979d7cc17e14e4943081ee09b428ba1a10a8cd7ae5b24412de0cf8293b6cf58b94b031ad5b6d124c
-
Filesize
370B
MD56a703c7374aba0570d513f7d7f07647a
SHA1aa2c80f86522623ce624782e8ae374ab86ff9641
SHA2560e6992e08830ab544d4a4b40deb96186ef582c54d7e5fa871920c7535f29ac21
SHA51246645b4a749b8ad540e6b7e6740fe37d67987f0b3147ea2b7e9bb06eeedc44c4dad1870e5760187e9a639c67b31be544ba705a2456ea3fbf70e93fa6edc5d7d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5882e22aa9a3f4fb2db179819469de3df
SHA12c5927efd09f67c6e231c31c0d178e6ef33b73fa
SHA256824e0630a22785f438ae2fd23e024bcb27b0dc0d64a440ad4b0a4121e59b3079
SHA5126acd661a71a153a602acda179c1495ed33af08a8ab2e1bde1ba0727a37736dddb3d30917ed4c7c99ee3cd6069ce6061190e667534fc764f1546438979c6a38a0