Analysis
-
max time kernel
1681s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 14:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tria.ge/submit/file
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://tria.ge/submit/file
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
https://tria.ge/submit/file
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
https://tria.ge/submit/file
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
https://tria.ge/submit/file
Resource
win11-20240221-en
General
-
Target
https://tria.ge/submit/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 4028 msedge.exe 4028 msedge.exe 4892 identity_helper.exe 4892 identity_helper.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2580 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 3528 4028 msedge.exe 84 PID 4028 wrote to memory of 3528 4028 msedge.exe 84 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 3244 4028 msedge.exe 85 PID 4028 wrote to memory of 1308 4028 msedge.exe 86 PID 4028 wrote to memory of 1308 4028 msedge.exe 86 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87 PID 4028 wrote to memory of 4428 4028 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://tria.ge/submit/file1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa787346f8,0x7ffa78734708,0x7ffa787347182⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:82⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4107431882879993212,7400643442001233684,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5340 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1940
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:368
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD524e7e72685cf289310250878192a32fd
SHA1c92bbd62b2a9246b4ff1ff46c86dcb8b6d2b4f9b
SHA2567c331a098cdac1095fa21b359ba1fdd8a5d98e2e08fe2c933dcc0bfb2de1df97
SHA512b03dde250b35938c94548c12db21406d9fcd57a528342b78c6791b8876ff6d1a6971d30bed1d4edca53025471c3051fb3583ca20aec118ee15ff3cf353d59ef7
-
Filesize
175B
MD5646fa6d91f6fa69c50080121706cb3b4
SHA149ffde5a81ae00bbe09766787257ee2bfc571c1b
SHA256aa13cb680226025fca10d26fd98041cfb49371d19a96f9bf04ed94fd301864f9
SHA512d4d6dfb81cdd500f02d0a2569f5679be5c66f23fcf42c61ae16215697523f0a8eed26af58d4135c964f3ea1dcdb83b42ad391ea2b99693eb23bf4195007859e6
-
Filesize
6KB
MD594e96e7f8f8969b8740b203969914c25
SHA175966a6d9654c0429758ef4f7e1d73cb2ec647eb
SHA2568fed6a8274c67dc70c2fdc501089a08a1a1b45b0abe57111667f2e9bb7ab7a4f
SHA512fd1996bbb4faad1570cd929e8d9bbfb520167aa9e1e6793e7212ecb17351fa6254b8b1b4012e50521e804276f03d80c2fd95f08aebe4d7a1caff990ccf160ba0
-
Filesize
6KB
MD57efc74319637a3c89cd74d9af5a6e636
SHA1022839ea71371492b082685380ad540165d59627
SHA2569192178fdcdf8a6da79f027c8b8727052ccb537bd02b00df0f56fc690d241430
SHA51258349b7c2f23556199903c63f5dba83476336c4245390679699ff53bf7aa036f0b40a154f8ce4953e5030d00f9593df0f790f51422ca2c3f8ac780e6086bacb2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ef82a6e0434b22a752a14d5fa8f88f6b
SHA1cfa3a8f575ec9540bd8ead6cd02a2a0bcd52f9a7
SHA256f85e69afabdbf2a70485561a2ffc719d68c3cd98e0d38cae2911cb893a84cc14
SHA51224cc6b631e2d412b21c260f22cd53e745198551a866f028e8e2f06b97f53bf738f9cb1561608608c09624d6082536ad6dbad08f1cee06dc712527b55adf7760f