Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 08:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.researchgate.net/figure/CQI-MCS-and-SNR-mapping-for-3GPP-NR_tbl2_335395546
Resource
win10v2004-20240226-en
General
-
Target
https://www.researchgate.net/figure/CQI-MCS-and-SNR-mapping-for-3GPP-NR_tbl2_335395546
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 2424 msedge.exe 2424 msedge.exe 3692 identity_helper.exe 3692 identity_helper.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1524 2424 msedge.exe 86 PID 2424 wrote to memory of 1524 2424 msedge.exe 86 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4512 2424 msedge.exe 87 PID 2424 wrote to memory of 4692 2424 msedge.exe 88 PID 2424 wrote to memory of 4692 2424 msedge.exe 88 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89 PID 2424 wrote to memory of 4472 2424 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.researchgate.net/figure/CQI-MCS-and-SNR-mapping-for-3GPP-NR_tbl2_3353955461⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabd3146f8,0x7ffabd314708,0x7ffabd3147182⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,1869324527429427492,7313914104690616600,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD59916d64377250aea5193661c04a0cd7d
SHA1949ba3a3a5fbcdf753292a150e4d42bda7e6b762
SHA256ef89fcea5f72f1be23ee2a3edff943d907b1d5f738064d1687eb209ea93bce71
SHA512d0e992cc63a961d141d52e1aa299451e2434edd6f6da38f0ea214c901f1080728c107599e282c68d3a568fe514fbfc933abf1bcb7e2cc9c5e2340967b6cdb263
-
Filesize
2KB
MD5829fc68d6c9227767e450a5cce787dff
SHA191a09e42f8a0baec9bec1906281ca8735a6eb269
SHA256ea997c63669cc521ca9d15beec136134575fb4305d1f2d95296a421e8c630254
SHA5127b00fdaae203e5e0cca985b1faf163583df433f5cb98b4399c964e84a942444d71d08434edefe2b14ad21a891c7e27d4983c9e4616963b7039e4f88473e8b0e8
-
Filesize
2KB
MD5a49a89eac11d4a9334b2baf443689fd6
SHA152879ddcb4a2e598473aaf2586c2f491e3f8de59
SHA256dc79a881d8b4a23cda13de4d40479bf8af16e571a19dac5df1bbe1efd31a3030
SHA5126c9b78656b2316769fc1301a978ac51d5d909ffe812c0cd29c2446c2e22ea7d6e6b627ee0425753780ea5779fa51626f9da9d2706e94218de01ab6e41c6d1750
-
Filesize
6KB
MD5508cbda3afe1c86638c9256cff543c33
SHA1737ec835d13294331b2fd653451c08a5d35bc504
SHA25656cbd42fa940646959296b8d3180fc67495e6ca8470e590d797f69ca2e860ba6
SHA5127159ec19387d89cba1cea9f0f523dc5ecd60fcb035e2f480296a992e76354a4fd29b93956a4cf3d7710549c268299802679ad74f2bf42d415d8f49e352897b01
-
Filesize
7KB
MD5ddc23c76ee88118bec1ca73bf0acbba7
SHA1f29e69801e8262aa8beae6db71bc4836a0e614ae
SHA25652eab7fd36215f24e43c1565200d6b809c9597043f21d1f6b82c9b1210e14048
SHA512a99fc5beebc41fe6d85353e6057e53be4a1b84e9e487858eb6bc202b8c2ece2dab0328efee9b17fc806934277edec3487bd40811c286f2715326df4f9e0104ba
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD52a5d596954591e4ea4790f72b127cfc6
SHA1db5cedec7878eb5d49265f7d0f846e460f5202c4
SHA256e1d77ad74e3b8026c37e4690391900c4e561ff658862ca7dee82a7d682a48f79
SHA5123480cf56ca6d8b986c7007a810534356c54db31781f2ea02931919bfdb80c508e9c6292dc65b67d6ae428057ceebbfe5b5814597ff20e62c20bba91a53862ab4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe579153.TMP
Filesize48B
MD513db29f996d0a2bc5fc027dda7be63d9
SHA1f4f3231de1e33d09aaf88894778b2adc150893cd
SHA2565c7df9b6fba6429bca638eb007ea19a5316484f97ad5db629f121f6c00764d0f
SHA512ba824fa748bf1af8f50580562fd182ad54053dfd494471260c60ba476167dd66a0ff8b1b509b6eccc317e42992b635288d0a4582e13c715a65f705d71bbf0398
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5efe28d285f173c3d29b665b4f4b661e1
SHA1c7f01370f6fe0b1df925d9316dbcc82881f47a59
SHA256fb5ba6cccbc2c7199d645071bda4092663f495d5fd783dc90255ae56aa7b25e3
SHA512895e9996c04ca0ae533ae9cce17fa340c393fb100093bc1c843fd86ac19b3066d1cfb23a0f7f3b15fbb819c222ae41e5db6ff7e6ef0b6af9cfc2d73333158261