Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 05:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ww55.affinity.net/sssdomweb?enk=f37b53b13385227d6b6851c7146857f50024322ef8cdda8cb5f699f8cc057105d588168160a6586d536e6c6381af160276ca6e70a64c858580356a4ac02f4175a6e89f868fe8e93c
Resource
win10v2004-20240226-en
General
-
Target
https://ww55.affinity.net/sssdomweb?enk=f37b53b13385227d6b6851c7146857f50024322ef8cdda8cb5f699f8cc057105d588168160a6586d536e6c6381af160276ca6e70a64c858580356a4ac02f4175a6e89f868fe8e93c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 3796 identity_helper.exe 3796 identity_helper.exe 5968 msedge.exe 5968 msedge.exe 5968 msedge.exe 5968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 3012 4520 msedge.exe 85 PID 4520 wrote to memory of 3012 4520 msedge.exe 85 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 2512 4520 msedge.exe 86 PID 4520 wrote to memory of 4716 4520 msedge.exe 87 PID 4520 wrote to memory of 4716 4520 msedge.exe 87 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88 PID 4520 wrote to memory of 2968 4520 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ww55.affinity.net/sssdomweb?enk=f37b53b13385227d6b6851c7146857f50024322ef8cdda8cb5f699f8cc057105d588168160a6586d536e6c6381af160276ca6e70a64c858580356a4ac02f4175a6e89f868fe8e93c1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff88a3f46f8,0x7ff88a3f4708,0x7ff88a3f47182⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:12⤵PID:420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,6293542987173037143,1155025834090268958,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize888B
MD502337f503ffccd2bd4bf43d248a13e3f
SHA1b5f039bfa3b136418c78d4e2bc677fca3e8a1efa
SHA2567e8e10fd3406d66becf512157f626c7ec6836b73d6f84fc0d5acf22aa21b5119
SHA512f9a28ab3c19ddadd8ac2495fff5fd0d5372f4dbf4075bb7a487f6231339e38e51db7b8b826859b56abc60f01f852598413c5dbf2e303ef5cc5ff6e76a4b5ff8f
-
Filesize
4KB
MD5b6dc85c6384fed36cdfacf38af8264b9
SHA18a288874aae8391591c9ab6bd343f0ddb519ad30
SHA256321d465ad8d82abcb048f7286f040ad3bf5c475468833ed5679e9d1c6d2a38db
SHA512eb83a59570d5b8d0a3fe96f5b5170db8dad5e1e5d83fecd999238f2ef4c703f480480a16911c63e3ed1da351b4bda5e845a912611b560bd55a5c056c360f6f3f
-
Filesize
6KB
MD5af7390aee19b6471645d83c2ef39291d
SHA1c48f30bab69d953d481f0739ff9e21575cbcb394
SHA2564b19e6d542e70409d75f12322b7a1c3c9b23f25cdc7b069235b23a7bafa9529e
SHA512b6a4e1bafa762cf258cef0d1be7f68a3f3bcbb7310ee4141d4b017d9ec7319039dc6163e5d0c130baf9acf348d22d8106dd1b576218ce777e176469b153934e6
-
Filesize
10KB
MD52281dc808fd419fb0eca83caafdcbea3
SHA1529d158fdd092288ce8ae7b1f2f812d7a3e73598
SHA256958c8b981f07b9a3aed997593524e49189ba7161a3f213b01bbf6c03b93bfaf7
SHA5127a69ae14528111b4014e7b6da625c73cfa2517e16212fef4bc8752c27493b8b9e40c783d2a25f7c78b1d3c32c4eb7d5edb2faf1e8b171003b4145b12768541dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e972b2ec780b7b246f739a86f1cf8009
SHA1aa2c505283b59f93b1629b69b9ba92bb8803ae62
SHA25651ccdf586c91b432599c2e38fbfd645033170651aee1d0513d194da334d74259
SHA5122c443a4686d4f0c0daaf327b3700d233d79c0f8d1911e8c6a6ac7bf298905ea482efd08111a93eae62a157c785c0c3741e36b7add21a7ddc4d3764c6604a45d7