Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
login.php?skip_api_login=1&api_key=966242223397117&signed_next=1&next=https:%2F%2Fwww.facebook.com%2.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
login.php?skip_api_login=1&api_key=966242223397117&signed_next=1&next=https:%2F%2Fwww.facebook.com%2.html
Resource
win10v2004-20240226-en
General
-
Target
login.php?skip_api_login=1&api_key=966242223397117&signed_next=1&next=https:%2F%2Fwww.facebook.com%2.html
-
Size
43KB
-
MD5
db2892a3d389123d16d4a6f9ebd62e7a
-
SHA1
182285ab59c4f188c5ac13d2b12c71b9854dd8e6
-
SHA256
70c9f057f65298a8b6726122d4cc86790b01b466f3dc82aa242a4feb9c3c9048
-
SHA512
74e6ca0f654d7237db1e7f76c440805a6112aa7bbe5f685f12e4b3a9b5418db0e235cd3a658fa74006d03993e8f248f503b94e6c4a3a7d711e10d19e7ca0c589
-
SSDEEP
768:I5iPsMnn5XL1WGl7toIK+S+xDqO3mkHTtxNwFOHbxb8jafkCleB0ptGu1NwNTeK:GiPsMnn/W27+IK+S+xDhmkzzNwFOHbxC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 5028 msedge.exe 5028 msedge.exe 4860 identity_helper.exe 4860 identity_helper.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4772 5028 msedge.exe 85 PID 5028 wrote to memory of 4772 5028 msedge.exe 85 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 3752 5028 msedge.exe 86 PID 5028 wrote to memory of 1728 5028 msedge.exe 87 PID 5028 wrote to memory of 1728 5028 msedge.exe 87 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88 PID 5028 wrote to memory of 2912 5028 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\login.php_skip_api_login=1&api_key=966242223397117&signed_next=1&next=https_%2F%2Fwww.facebook.com%2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8486646f8,0x7ff848664708,0x7ff8486647182⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10585232142357531147,8638242613432100234,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
187B
MD54c2e0232494deeab75060e73a21a64ab
SHA1f46c43e475dc19dcdef66fd343110379d596c13f
SHA25620d9d4f906bef0d5e941d91db89a4f14c7ab3c4af57beb4dfd8a8815cababb42
SHA51218e9d7b5b1a9f0dbf13ebfcf32f840b28c974f119e21e3e71051b41d9fce6bb90a824888bbc9e626672f2c817707e08d157d7eccbcfa2d2541ea53f1cc96cd4d
-
Filesize
6KB
MD5770518d4feb0d910ddab57edfef83a7b
SHA1460aff6b2f1c8811f560643fc3ca69893de6a7c7
SHA256e8fc2b5cb65dfc8c53e186d4bae34e424b8cce6992ed753f0b3e4860c96af629
SHA5129d1ebb59bd67eb3b25a0d160b623081467de85b195adb822368054ea95082fd67b1d78b20dc0169ef40f064e9dec766736cd1319bc4b333208720ca530d1d82e
-
Filesize
6KB
MD565191f8f878966defb105942e478e70e
SHA1c572da6ac7c4e46886c1f5d334705147cc03ce23
SHA256e0e2a7254ae7563042df9ecb6664f1f23729c523eda214009785368742f83493
SHA5128500bf99d3d9c659883ec4a9e4350da9d561b697fe1ee20e13c12038f7093dc55eb711788183d58ccccc014e6daf3f2fdfe54335ec040b983f0e9eb93ef95360
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD551e394ecdf3132532b2560cfcc662461
SHA1e26e4eb4c5c36e03f2ae6a7514ecb006d436d77d
SHA256b647af2e8abc4c751725eb6291d7d85c62ad053706340b5eb03f5a2e56a9a4f3
SHA51226c2d8d2bca6ed0bdd5832ed6ac24833a64c4d4c92cde99669fbbe6b827a76d1334f44d62dbcbff38773275ae0bbe570781ed710d19c864a3607e03c2523f049