Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 13:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://solarliberty.us21.list-manage.com/unsubscribe?u=2f4e06b77efba6cae117b3475&id=9ac3c1847b&t=b&e=6ccb2ee963&c=09dc1298c8
Resource
win10v2004-20240412-en
General
-
Target
https://solarliberty.us21.list-manage.com/unsubscribe?u=2f4e06b77efba6cae117b3475&id=9ac3c1847b&t=b&e=6ccb2ee963&c=09dc1298c8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4500 msedge.exe 4500 msedge.exe 2716 identity_helper.exe 2716 identity_helper.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 1552 4500 msedge.exe 85 PID 4500 wrote to memory of 1552 4500 msedge.exe 85 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4056 4500 msedge.exe 86 PID 4500 wrote to memory of 4912 4500 msedge.exe 87 PID 4500 wrote to memory of 4912 4500 msedge.exe 87 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88 PID 4500 wrote to memory of 3676 4500 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://solarliberty.us21.list-manage.com/unsubscribe?u=2f4e06b77efba6cae117b3475&id=9ac3c1847b&t=b&e=6ccb2ee963&c=09dc1298c81⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb058246f8,0x7ffb05824708,0x7ffb058247182⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,13968088460758213410,339211924023281389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD51d6828a3f6c52bc6b052c1451c9f808c
SHA1bdd3391f0195e3c32d41fa0e11301c94bdc8d506
SHA2564bddb0a5ce22cc5112aff5d951ed0f3c0333c5329d701bdab305651406029bb5
SHA51268524de9c6b06d738d7db62d41f959cbced6b7e1bb67f430771d89313e50488a34cb334f62337395895597dd9f70e1369d01fa21bf7eb74fc068330e2ee0a148
-
Filesize
1KB
MD58058a31c02ea085edd55429dbd608c23
SHA141daa8e854f3aab39ae794664a2e898cc1d84b38
SHA2568b8b849e1d89d6038fcffafc459125141618de09e8ea833b21e432a4e3dd92e9
SHA512494c56ddd68aca7adb364f34896cd08dd02b94774b502f250034cdc47a228a30227de5c2e1ab662f78f87eaa800766170d7bc72a5ee788438c9dabc672bba655
-
Filesize
6KB
MD5316087324434a6cff8f1452ac4140c3c
SHA1b941aebc6978bd380322eab29056c8874cee94ef
SHA25652d96147164b05b43b7ff1035aeac1691f0aad74209f08399d4762c4e1ba405e
SHA51261e1afa4eb1002049cbeaabe06c6e4a17b69125e3981e8c0bd85709b343ad525df8b6f8a720b1bc9db1b71deb04dd02d6baaa7c5baa741c66e5a49ca5f92eaad
-
Filesize
6KB
MD5050c6cfa8a9713d4a0641093c77412a7
SHA1db6a4a47e464aeb02f7a71a1f3cea37b1f90619a
SHA25632779beebab3e7501393df66413947b6979dd5948087d09cf86f8f2306ac07e7
SHA51234d05c0cf11c0bac95d0cb022f4dfe1b01a85be2cef33adb95944184114a0ac797d5738206efdef368b04826e413d2dc0a58a56ed4b883ebf18a42953ad0511d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51e6358a220843c23466ed06301999dff
SHA1994024c139580343d909861dc30f2f76ef8da9af
SHA256c4509a3e663cef5d81ba1fb9c5a2c7309ccb1af144a20d05a64ce64cacbfd05a
SHA512332db16c55c710b093aa788e00344ae83334550a68ce649d9837ed04bf9ed0e2b359602d13c0b02bc1ed3e2b8092940be05836063313de0e575a841b8e42b2d2