Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 23:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pub-c18999b67a434a549f041a1a1633e312.r2.dev/link.html
Resource
win11-20240412-en
General
-
Target
https://pub-c18999b67a434a549f041a1a1633e312.r2.dev/link.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 400 msedge.exe 400 msedge.exe 2352 identity_helper.exe 2352 identity_helper.exe 4008 msedge.exe 4008 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 2804 400 msedge.exe 79 PID 400 wrote to memory of 2804 400 msedge.exe 79 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 4340 400 msedge.exe 80 PID 400 wrote to memory of 3996 400 msedge.exe 81 PID 400 wrote to memory of 3996 400 msedge.exe 81 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82 PID 400 wrote to memory of 4924 400 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pub-c18999b67a434a549f041a1a1633e312.r2.dev/link.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc69073cb8,0x7ffc69073cc8,0x7ffc69073cd82⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1704 /prefetch:22⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,14447859100825446517,401537240668809490,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5552 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae7fbf62fc07f0bdb15169d2de3dc768
SHA19155eb973df31a7d6fb95f03058dd523171b4f0f
SHA256ecfebc84b01ed9071cc68bc2abc4eae4f891e1dea41a16ea6010f7acfd6cc624
SHA5121539bd6c522e56685399616d9811435ff0197c9471404361c53370a261feb180a38aaec9aacd38ff52c94b2cac2e4da19a3de50a9b6541f6f3fd0497bf15bcae
-
Filesize
152B
MD5a5e869975d65ad786022d6fc8b47b747
SHA114b030f53bc86bdbec766b2f3942804ca742043a
SHA256d5f8f63c67fd06a2ae7da80cbe8cc96bab5932087eb70432df9147ba818d758f
SHA512fd8d2b8ce13f4aca312f4856096edba99310a78a5f4c4148046a06e873a3d2514fd2dd9b4515fc89e83306d251929f2ef9c78863f85a3e017a3029dec63d98dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD56c0c2f5cf6c426de5b8636f964c61097
SHA1f4905f56239e273df31de2f44c70725d86d3b6f0
SHA256181cb0163703907d54ad4cd63ee1f7ff6326e9b6143648a25f4ca3fd327f8bdc
SHA5121ae93738e566524bd7227f4ef0ee1adf154d0139617770fda953b341a5a4a78aa80d6c0544ad21d38d4d609ee1a761edf419958a226a480729e7ad0edfd342d9
-
Filesize
193B
MD599ae22c3441935823773507e91d038ce
SHA129dc5ca8ed6b844aae14c360526cb4c3677838c1
SHA256a862ee17d7503f740784dc7a4dd81c458bc4ca5e18af54b104d51bbb1b518bf3
SHA512f715252d5a32c50a11147d416b430028a02b9fd748d14d20754b5d1412f2a97daf770321af3d9a06255698d88d9265782bd6d1017ee82407eaf3ff3a13206691
-
Filesize
5KB
MD58e1f05efcfd0617b560de9632f9e1bda
SHA1ec259db3eb8c02c438b44eb7c055b26afecf09d1
SHA25652c8dc3c6c80e9d274753eb88f868ddf35de78f11134e5fa71a3f6a787989013
SHA512a0037bd420032f05fbe2459fa00fbd6ffd39b505b0a70238d9afee2df7369ac42268aeab716df018051c0f8a7b773dbf8bdd49ade3308ed23778ffc23b0c8c5d
-
Filesize
6KB
MD56a59b1fbea9a5a657b76b645b4f7f8da
SHA1caf3da71ad6f4ee41891b51247ad959c774e8258
SHA2565188d328524384c02c80fb07b601979a041e49b5b5cc74db37c57d4718d1b24d
SHA5128749707bcf166ac898470b68db8f49de8c881392b746c61c20b3faa2f50b4b1cfbe3f4c78ea7793c6969e01452822cc0b6268b798f2268cb1ffb63b54150f4a8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
12KB
MD5688c97221b7354565ee29309393f93fe
SHA16d104fdd00398a98f90618d0128710195b47aaff
SHA2561369eead11ba42eb8d00c3c5317fe3e27c31da0dfbb2f3b781505249af36b016
SHA5128f02ed5eb347a4543fae0363264ea85aa1ceaa58c2b3e3858d1c0525131d1ce190260063f835531871e0d26c0e97e75bd1683affd12edc7c847d5dae3fc6496f