Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
254s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 23:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.peeringdb.com/asn/20940
Resource
win10v2004-20240226-en
General
-
Target
https://www.peeringdb.com/asn/20940
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 1868 msedge.exe 1868 msedge.exe 1824 identity_helper.exe 1824 identity_helper.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe 1868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 4896 1868 msedge.exe 85 PID 1868 wrote to memory of 4896 1868 msedge.exe 85 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 1596 1868 msedge.exe 86 PID 1868 wrote to memory of 2240 1868 msedge.exe 87 PID 1868 wrote to memory of 2240 1868 msedge.exe 87 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88 PID 1868 wrote to memory of 1008 1868 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.peeringdb.com/asn/209401⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84bcf46f8,0x7ff84bcf4708,0x7ff84bcf47182⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2416 /prefetch:22⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2408,8062204960369861539,2987663899043081446,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5807d55d1fb076a97b410f9d27ebdbd7b
SHA13936de84e40aff7c377c117db980304daa580efc
SHA2560f69efc754be07797a98b29ef32f298171070619dfc23e2c2da0484614ce4830
SHA512d28afdb6d2207b37c6735e17f1b620c12cda14f7f3ea1ffe0c134c2710a4d20c0b028bfb97e796e3dba5f95337741411b2d44a06bfbd2ec2a0573dceaa3ac610
-
Filesize
1KB
MD5ba087086b1c0dbcec38ebe9c5e9ad92b
SHA1d0948a1923ca0d9b00fb02bf5dbce9b56e218b92
SHA2566b186932ee4df748875272da8c85f6aee1ac70bb527359ff0c3cf581a4d1e67c
SHA512b698b0ec84929f502e34c9fa60b2a929c0fb2b282f1a7a3bcee146b35b6b11ea817b1dcca7d63cc37d42f7ff6fc93311400279e745674aff26541cee40e583c0
-
Filesize
6KB
MD54facdc32f407a8cc173573c5668fe190
SHA1aa5262c3af02873ad70d91f27b50a26fb053cd21
SHA256804d7398c93d4e109188f3257157c31a168e364a67e83fa0bf34737fe171cca2
SHA512063589889bd9dc163cf9899d74cf97a198a9a40b6f65892c30c0c6132d7ad58089bf30fa2113e51d5a502ef5b42eef3718e69c1d545607f27390dbbcee37d185
-
Filesize
6KB
MD5bb5e35794fc4eff1fcc3f2db02b69e55
SHA157a2da9a4a059d2aa2f7788338065e2b46266f6f
SHA2566df84bff066319422518b7e4ff1f48d2679e7cf18b26ccf2afeecd8a7e2cac7e
SHA512946d5a683b1ccec7d22fabf5bfef08628fdd156f1ff7fa112a241ac2ab857b0347dfc482d589d4ac387c3f30d7fc2311d11024cae59249201836cd6ee726a0c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b2bd0462afbc23a19139ce7b51207ee2
SHA1eb502d0a866d6603d5a6ddfc581396307bffce85
SHA256c8d8117027de41fa8c32b8102052d7734a4abdb5a9942f1d326cc6285dd69b89
SHA5120eedc2dfb9121fd47d2b123605146894cac32e2acbd439535042a01ce59cf26fd4b0ba7deb43d002068ded892c8c00689f891ec57cbab8d8525c249130fe794e