Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 16:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1194415851378594032/1194416329747353781/Viper_AlphaTool.rar?ex=66283e64&is=6615c964&hm=5cd03a472f21e941bdfbec7c46f45a6b59c99c48fd99b7b414cc3bef2da6d80c&
Resource
win10v2004-20240412-en
General
-
Target
https://cdn.discordapp.com/attachments/1194415851378594032/1194416329747353781/Viper_AlphaTool.rar?ex=66283e64&is=6615c964&hm=5cd03a472f21e941bdfbec7c46f45a6b59c99c48fd99b7b414cc3bef2da6d80c&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 5220 NOTEPAD.EXE 5372 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 3812 msedge.exe 3812 msedge.exe 3624 identity_helper.exe 3624 identity_helper.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 632 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe 632 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3812 wrote to memory of 3852 3812 msedge.exe 87 PID 3812 wrote to memory of 3852 3812 msedge.exe 87 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2280 3812 msedge.exe 88 PID 3812 wrote to memory of 2168 3812 msedge.exe 89 PID 3812 wrote to memory of 2168 3812 msedge.exe 89 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90 PID 3812 wrote to memory of 1904 3812 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1194415851378594032/1194416329747353781/Viper_AlphaTool.rar?ex=66283e64&is=6615c964&hm=5cd03a472f21e941bdfbec7c46f45a6b59c99c48fd99b7b414cc3bef2da6d80c&1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff528a46f8,0x7fff528a4708,0x7fff528a47182⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12618840273882376096,11353228353532826709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:4260
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Viper_AlphaTool.rar2⤵
- Opens file in notepad (likely ransom note)
PID:5372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:632 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Viper_AlphaTool.rar2⤵
- Opens file in notepad (likely ransom note)
PID:5220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\78768a26-930e-43c1-a654-9be3a69c7ca5.tmp
Filesize186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD520fa1bb89a96cef7c841860563e27785
SHA1449d1c317e4d0d77bf60a21df092927358146ed3
SHA2562b5330f3f932d0ddd75908120e50c4c0fa7a570902e6cc18fc69c5ba72a08bfb
SHA512e9a026409165381660367e72ab522b2142acc971df8bba424444b7313b22a7447d0661f6590fecf14a52432ed7e3c88c91074bdd7be106e32792f1e10f90ab4c
-
Filesize
6KB
MD585acccfa9212688bc6cb28b35c6fcc01
SHA1e1a581b7a610a4d9c7728d0f93a4ea5197abed9a
SHA2560cefa1d10c68836efb3d01bde11a7bd7052831149d3edabd3ce9fce0981559fe
SHA51221eac8726d516e058b41e19a7ce13943df3f4e353c697baeabd30b7389166488b3dc276529f7ee16e8aa9dc51c473e90cfdd98d721592991af554e2ea0f97199
-
Filesize
6KB
MD5e59ab7734a10288ed960943ec8d10995
SHA157bbdf8d761c7b55755c9b832156fa879d5b7631
SHA256560b3b752164e8a8cf03197f2b67571d0b7511e07079a2ddeb560393fa3b90a5
SHA5129d6657a2ffdf480c2da794916afd8b0aedb56a55877d0faa0b29a5847fafc11a8b6035bf62752f546727129896a57efddc83dda59d0bba1d45930d8785b3203d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59fc99888b6df37a6e3cc2ea6d2ff771f
SHA1648a202a80aace6a457008862bf341a8ca2c7e90
SHA25680ac0252e40c11e28ee26c5e083c2aaeda04fd6c8bbb429bb7c2af81fc9917af
SHA512c80a88f592df3eed72a4d7db87b299b0653d1bc03d0b720840b197bae45ec9bfb779e8f944eb832e18c44d4d456925efa58d1ba895ec97e2a6e785e136a18eed
-
Filesize
5KB
MD53876d3b4f079e1345adccee73a970a9b
SHA111615db1318f7282702a9c0204a7b59cc78fa6be
SHA256016fd4eb8273411aed0c1aad2da5ca4fc18a789b9a907b1cf030fd67c32b27ff
SHA512af0c99929d98f7fcdec2746b417ce72337e0bce5b66c994346636c1940b8a5ef1dd17a96ca06381aff1bd9b43dc8061265bc897a0e241b8527483bf2d283832a