Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
162s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/03/2024, 13:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wa.me/message/QBOGGKVNIJYQF1
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
https://wa.me/message/QBOGGKVNIJYQF1
Resource
win11-20240221-en
General
-
Target
https://wa.me/message/QBOGGKVNIJYQF1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 1476 msedge.exe 1476 msedge.exe 4108 identity_helper.exe 4108 identity_helper.exe 3400 msedge.exe 3400 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1156 1476 msedge.exe 79 PID 1476 wrote to memory of 1156 1476 msedge.exe 79 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2948 1476 msedge.exe 81 PID 1476 wrote to memory of 2052 1476 msedge.exe 82 PID 1476 wrote to memory of 2052 1476 msedge.exe 82 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83 PID 1476 wrote to memory of 4536 1476 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://wa.me/message/QBOGGKVNIJYQF11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdd4f23cb8,0x7ffdd4f23cc8,0x7ffdd4f23cd82⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1816,1436082134256804684,13466880692413242368,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD512b71c4e45a845b5f29a54abb695e302
SHA18699ca2c717839c385f13fb26d111e57a9e61d6f
SHA256c353020621fa6cea80eaa45215934d5f44f181ffa1a673cdb7880f20a4e898e0
SHA51209f0d1a739102816c5a29106343d3b5bb54a31d67ddbfcfa21306b1a6d87eaa35a9a2f0358e56cc0f78be15eeb481a7cc2038ce54d552b9b791e7bee78145241
-
Filesize
152B
MD5ce319bd3ed3c89069337a6292042bbe0
SHA17e058bce90e1940293044abffe993adf67d8d888
SHA25634070e3eea41c0e180cb5541de76cea15ef6f9e5c641e922d82a2d97bdce3aa3
SHA512d42f7fc32a337ecd3a24bcbf6cd6155852646cae5fb499003356f713b791881fc2e46825c4ff61d09db2289f25c0992c10d6fadb560a9bea33284bd5acc449f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5d2100c0b3cfe28baaa23debf7e2e8be7
SHA18acec81899130224db5f91f7ae26667d7efef776
SHA2569df30e3edca33e1a77bd0bf07cb9b2a5e998a4e340b7f2133e85fb410188aee4
SHA512666daa6198c5f63d45b1b30f61674cbcb324ecf2825b60d808595b2a38f6e802a66cf7f60320f9c4a4c79671bf054f5ee192130b4678fd964586bef9bc0b486f
-
Filesize
250B
MD50fa501124c0bc5f0e4ba9d573f6bd813
SHA142576ae4d301bf8c9069ce58547bfca10a22ca6c
SHA256130301a9b41e21992b28d8070352ce31e6787b6e7c0f11cdd270627ded0a7f7d
SHA512adb1d680fb3358703bb1773128b25a98b84da34c8d2e1f23d41f23cfd47db765e6e6115eea9296292e7bb47290f8c62943434f7188c2dbe89c146746cb6cb81e
-
Filesize
5KB
MD58d56fbef0d6c8cefe1acb8d998e5d0fc
SHA158e6d16233089ec3a535f08f472f299ac057fbe2
SHA2564370041fca1bc208a8395ec1af5bdc9630ee8cf404846135bfed649e3751eb31
SHA512b2e04c5bb6dec2702c21b1deaefa6424da6190b79062e9b2691807fde6b92de7704902beba152e1dc0e47d39e7595fd228c4a70c42fcedb6a682b5493376862e
-
Filesize
6KB
MD547805ec092c88d719f04048984d60cae
SHA1a32245360e602228551fb9980f9cf3e69a719d7f
SHA256bf0c63f3c05e9bda560f4a1a8e852d2707538e2e9102c2b9b4d1e1b808795a1a
SHA512d459f70e5640e075cf00a82f9590b1c21bbba851be63c906b1025653a960097bae6a18e4c339f8be0f79ed026901fcecd4983f3af421cafe5f631206b00bdd44
-
Filesize
370B
MD59af29e1ce18753e49f8a75f9beed3e62
SHA11da2d60adb34b1631e0f280f8309bc3c4f15a9ef
SHA256c7e7cd5f313c9c84686a67f887202c3ca8d48b55e055cd5f038b34bb3901a974
SHA512f0965c8992ee39c0f60b71f8b67cb287e285a80b195a8801d046b7f5a5ae12794c4d3e0a82f3a73563b1745843733efd04bb4de79dd93ef83c0b15ff91d6007b
-
Filesize
370B
MD58ac3ce5e5a41a59b84f2312ae4a36942
SHA14992f65551ec6052fe0b1d847c50e595dcfefdcb
SHA256eba368f21155f7f24e016fb773c0a354153c86595c0b92f80ce085ba10b2e12e
SHA512e26ca8c58d6083b6e5fcfd389f2844db041795307e26a4e2f07ed734e73663245ebdf568b9977ce99c21976f95d2978c83183ec35952fc79eed0a73646aae7b1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58d9acd12bec0c5fb54e342c9e6e8c8cf
SHA157cad9c2cf9cdda2e083e7438620ef48db987148
SHA256fd23345e6dbe8077e3678bc6f99f480c8acc61ac6d10f26cc9dfe2f47cb284bb
SHA512c55edd120ddccca342407f4ed0f4cdc850092ee7196cabcf95d1ff286670fb1d70705341a8ea72763ae434191171f1291975f85b1ca24ac650dd95f18403bebb