Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 12:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://comerica.sharepoint.com/sites/NBBPolProcOps/_layouts/DocIdRedir.aspx?ID=F3K2HMVRHSH4-324-15,
Resource
win10v2004-20240412-en
General
-
Target
https://comerica.sharepoint.com/sites/NBBPolProcOps/_layouts/DocIdRedir.aspx?ID=F3K2HMVRHSH4-324-15,
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3252 msedge.exe 3252 msedge.exe 4500 identity_helper.exe 4500 identity_helper.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4728 3252 msedge.exe 85 PID 3252 wrote to memory of 4728 3252 msedge.exe 85 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3256 3252 msedge.exe 86 PID 3252 wrote to memory of 3240 3252 msedge.exe 87 PID 3252 wrote to memory of 3240 3252 msedge.exe 87 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88 PID 3252 wrote to memory of 4716 3252 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://comerica.sharepoint.com/sites/NBBPolProcOps/_layouts/DocIdRedir.aspx?ID=F3K2HMVRHSH4-324-15,1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3c2d46f8,0x7ffc3c2d4708,0x7ffc3c2d47182⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17171207739130616776,5751999749516538485,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
Filesize
275B
MD5236edf9735e8ec0f36248c42138157a4
SHA11a7e98fe6ef0456f051a8d9f14b965092c2cea85
SHA256a1e1e24d08e81abd6fefd6ddf93a20da2206c2dd924e07da58b092c517dfcb54
SHA51212c226226154d69c0c2f9dfea10ab962084462194db841e2980069e1b0ef1677cc0aa01cd14b7e792013d85eb043a114b5c0913ffe64691116dc7b025b5579cf
-
Filesize
6KB
MD57a0b637c78e702addacf2798f7416ca2
SHA12f7536b632eaae8dd89736ab8cc6b802e8045a5d
SHA256afb624a656aa5623806e456804195c3b893fb8c5f8f0d933e3b5418f73f05cee
SHA512dbe00daa4ad8317937e42c089607264882c69ef5435e81da6bd41a78f50d6eda8230899e0c905581d4e6e6981555c819bb397c0230054d3f6a44d2bc2054dafd
-
Filesize
6KB
MD53a5ff7b92dbdf44c53f70a333fbcaf40
SHA153d9d9b64dec3fadc519034adfcb0e51a618e1e2
SHA256b14e07ffec7678cef40b37e4dfc3119833a0cda6faeb348e4cfd781650a1b2e5
SHA5121d669863a20574dedf54769d585173d8b46256e1d79196c37bc34b28f34047d6cbe342c62018c412b9e3efa3ef0aaf30553f7bfedd8c32843b71548b78fb6ede
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f8651fd778e8734f68a80ca57b81dd64
SHA16895c1885e0fec2f62b02eec19741f6b6c780d97
SHA25651859320ab5edd033d1582a4dee1924f39617b36df1f7dd41d1df434c2df0405
SHA512af02599b056503d68f294ab021892259d1c3683940085cf39943f2d7ad47892b328b32f0f57085ef9b9d3be6fe71c0074a75464493fd9f8685836558561f767d