Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
175s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 14:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://m.fabswingers.com/forum/scotland/1592454
Resource
win10v2004-20240226-en
General
-
Target
https://m.fabswingers.com/forum/scotland/1592454
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 3832 msedge.exe 3832 msedge.exe 3620 identity_helper.exe 3620 identity_helper.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3832 wrote to memory of 2204 3832 msedge.exe 84 PID 3832 wrote to memory of 2204 3832 msedge.exe 84 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 532 3832 msedge.exe 85 PID 3832 wrote to memory of 4472 3832 msedge.exe 86 PID 3832 wrote to memory of 4472 3832 msedge.exe 86 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87 PID 3832 wrote to memory of 1124 3832 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://m.fabswingers.com/forum/scotland/15924541⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefe7f46f8,0x7ffefe7f4708,0x7ffefe7f47182⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3040 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1792 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2267609333445534773,3362195284253743730,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5f5939912ebbe63c73f1359475463af52
SHA149baf4ae4a833f2a45add3d1a65f8c8c59c2d89e
SHA2561773cf2c0234632015df3ddb4ff83dc59299bb7832683ce0c87f65a09888145d
SHA51226ceb07d6e24f6a09d0fd63911cbee486762ad5dba0a2655cd21c0e515c854888babe6a63b6e1f4c530868e0ac58f03eeb43af4de32d2b3119093da248c7ed16
-
Filesize
560B
MD5e9ab1a3b045123059563cae5428c68a8
SHA1c330c2fc137d54e12b8909d894911527156716f0
SHA2569d9a2b0fde29136b39567d1ca7c0025ad92c67a456e037d912c007c1c8920a25
SHA512357d8345e172c302390b7b44666440e1cd4fe53b25c2e703855d1d9ee4cbd7cd29e0e0406060e18e14798e6a41d5f4ca095e4311187e23bfac7ef33809ff0d4c
-
Filesize
6KB
MD590251f93861f8e20c524d3aaea22d2b8
SHA1cf12aa3d2fcc31eb22b4520d1b48e0cce08022b4
SHA256483671c3166e2e99ac0f8d6e4226b052f25c2c36d2de4941516694245caf2827
SHA512774298310ba93fbd552cf91a44bf9f5850543ce31d3d76d13707e315ff24fde9e997cfd85332c77b15dff91760c9b680a85bfdfe7e829788a6e76f4839ff4c72
-
Filesize
6KB
MD56fdb8dd3ba886d1a9087650e07547219
SHA1d0aa468640a1664997ed7a339709cb620e6d936c
SHA256598734476391168f3f13e280d570e245710d14ff39bf13ce4fc21789f05993f2
SHA512c4b3f61da516427558ccb8299d619814414a7a9a3e00d5af7283cf33005e2c25a140620f7cb6b5ac03b5f16aa763c1a85293a877482df351ad4286783dcce38a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD595eda90207caf3226078db37578afb0d
SHA17715ce8fc42f9b76f1b978c6e51a1a2f93855437
SHA25668449cd11e3c260e541fc9449f64d6053aba166aebe73c9c50b19baf4c2c93cf
SHA5127bac83a709ff86f7d6da5fc434b9d956a7d21daf99c9e78ccf958a524094f831a99b903a5b7a936e5d391a3de52ee5d9128c4d31ac719d26ce3d9ef51aff4cd9