Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
libinvert_plugin.dll.svn-base?id=3053a167982e379b031fe9fbe2a1d57c23026a90.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libinvert_plugin.dll.svn-base?id=3053a167982e379b031fe9fbe2a1d57c23026a90.html
Resource
win10v2004-20240412-en
General
-
Target
libinvert_plugin.dll.svn-base?id=3053a167982e379b031fe9fbe2a1d57c23026a90.html
-
Size
7KB
-
MD5
49eb8f8c411667df9ca0d89feb2ab5ae
-
SHA1
92e7f8b8a4de7bcc3b3d89f448fe6a450b2caba2
-
SHA256
cba6caae0d5e78b671f72936e67d97032e9b260c3da8f231eba5fc1f380a68b2
-
SHA512
135f95c7cd55b6e9ab5f7ec9126be5211becfe6b2ab0b0e3ea5e16144971f33ec6caa3b3e80f6f5099c28576ac96e14f6c701dc03922f8ed57a63e6bc9a5e6a9
-
SSDEEP
192:Z3vTPMcMHyx1+v5v/rv/dJv/uvCEv0mXHP5BxU9v/jvST/lo3f+vvZv/xv/5vIvR:ZrPMcMHyx1abdhZmXHP5BxU1WT/2SNK7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 2244 msedge.exe 2244 msedge.exe 4092 identity_helper.exe 4092 identity_helper.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 3960 2244 msedge.exe 83 PID 2244 wrote to memory of 3960 2244 msedge.exe 83 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 3516 2244 msedge.exe 86 PID 2244 wrote to memory of 2028 2244 msedge.exe 87 PID 2244 wrote to memory of 2028 2244 msedge.exe 87 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88 PID 2244 wrote to memory of 696 2244 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\libinvert_plugin.dll.svn-base_id=3053a167982e379b031fe9fbe2a1d57c23026a90.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0a8d46f8,0x7ffb0a8d4708,0x7ffb0a8d47182⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1870585052563811273,3337884433580747355,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dcf7b7f6db8648c9118903ae11d4ba7f
SHA174265dafa33994ef7148111bef9efbab6e3795bf
SHA256e37da26dd87b61af0f60814c294039c308daa1d9854b4b9329d4f0f73390fbc0
SHA512af9feca3a642b8b75de639cf8652772b3cd8af45071125b2f0e3a6c9dec6f29d304ce6d73c43fdb43d0ee1d10295700658104d5b0b6ab775440f2b9ded3ba406
-
Filesize
152B
MD5a1c7c8628309cb2cba92459fe2e71e8e
SHA1baac2923b088bba88dfd7a31f555fc3cd2c3c377
SHA2560090e38f869c2dd4de536e6753758ba86bac959f299004a1ab3755f3e11a7657
SHA512c958c4e8ed85749be852fe1c1d53f97b23e76d9bfabf0073a5a3a7c5b12f556da74770fa748b5943723c5f8b7b87bdb6bad35c4adff4f89909e37381763f3e92
-
Filesize
5KB
MD525e2a59ce4ded2ad93ab953ccb13bd64
SHA1c0b611e10bd096a1c796d1f797802c306530c867
SHA256a6c5f72aec801f898b1955fb08531aeeaec9ff003c4b5fa67993df284a6f17f3
SHA51251b7b6df0f21c93bc725dd3872f1cc36921b1685c160793531fa2d323ccaad8cbb13cf3278621b7ed24544ef84dff3233cddae9783a838e02973bb5a4f6975f0
-
Filesize
6KB
MD57ec6c7e10eb5c15dbbaf0e2543c2c975
SHA17ebca85e29e92139577d750c1be93745f357c219
SHA25623646711ad0c1ed40e53a6dd8152ab3aad086fc85f6f58687dd2f9edb67000b1
SHA5126f8227957c9ed605db8fb1da9e5239ba4a43b08fef526e5f7a751d63ee1a90d2ec81f00b45dc2f14d9f15a756031ef7dfa6509e4e02fe1701b2786f47c9094a7
-
Filesize
24KB
MD5f62f39afecefb4d599158edd0c332ce3
SHA1c204efb7df0bfa812978506a3e6fdb88dbb2e2a6
SHA256d0bfca70a679b26ea7ce6cada90113f728e32af376c90fdaa6b9f8e1c0e316d1
SHA51209ba87ba4c25971482b8c7cd78361f9cf188861b36f72c0391bcf8d8cfe2e362a17c281e044207fafedbbf863653185bf19cfbb79756a8bebe7f57befb9a771c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5db52f0c29d2e3e8fef49a3c236ba5139
SHA1ec83b623da22ec83100b63a7f2959a25404c3a21
SHA256b892f3349282fbe85ab1218e854f35c72e420fa7a02b43319c67899002e3c1ef
SHA51227f235c2ae797224ecac22b653ab614f125240f839bdaf613fc468b7fdf45f6067a9323a99b577aaf3341cc5f2aa2afec115c4f4f2c83f32324030d7f3d4c532
-
Filesize
10KB
MD5e58e7ff341df23e0af0a778bae6c5865
SHA1d9abbd0c364307dd3bf037f9ea1774704f0e2763
SHA256bee728d5a44d84c860d0f58533e00b1b8485020da7131bef1f7381357f5419b8
SHA512b417a5a4698b2b197639cb2e8cc5c2c5b89798d7994fe15b46b89c3389436a0d2d1668af7a336e77441b22c83e1ead311c0ffb2ecbce61238a31425cd3afe9a9