Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 10:29 UTC
Static task
static1
Behavioral task
behavioral1
Sample
libmux_wav_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libmux_wav_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win10v2004-20240412-en
General
-
Target
libmux_wav_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
-
Size
15KB
-
MD5
68237c9f38b4f0aacd255917c10197b0
-
SHA1
ff4c5332977367eece8c2c6b5b514c2561e678c5
-
SHA256
a9fbcfea6379c3fa6cd30944cab2a22c6094c633c37253be98c057a569fef60b
-
SHA512
e172b0da8e7c2e857a8bd4d69cf2db5cfcdd9dde7eb8f2708322eca671e4bc1166180446f7d19d1d16192e5f89d236db792902e86ad4b94e8d5447652ab8f669
-
SSDEEP
384:lcPMcMHyAcaC/ju/cvXkvDZ3eItILJzl+Cq124kbrBZFE8uI:+PMcMHyAcaC/ju/cvUvDZ3eItILtFE8B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 5100 msedge.exe 5100 msedge.exe 3644 identity_helper.exe 3644 identity_helper.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 5048 5100 msedge.exe 85 PID 5100 wrote to memory of 5048 5100 msedge.exe 85 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 5028 5100 msedge.exe 86 PID 5100 wrote to memory of 2396 5100 msedge.exe 87 PID 5100 wrote to memory of 2396 5100 msedge.exe 87 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88 PID 5100 wrote to memory of 2544 5100 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\libmux_wav_plugin.dll.svn-base_id=e3b43bd36fd50840467669364014ee53553872c1.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd96bb46f8,0x7ffd96bb4708,0x7ffd96bb47182⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1468 /prefetch:22⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14312832246043060711,17798389778003798173,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1692
Network
-
Remote address:8.8.8.8:53Request68.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:216.239.34.178:80RequestGET /ga.js HTTP/1.1
Host: www.google-analytics.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
X-Content-Type-Options: nosniff
Content-Encoding: gzip
Cross-Origin-Resource-Policy: cross-origin
Server: Golfe2
Content-Length: 17168
Date: Fri, 19 Apr 2024 09:16:57 GMT
Expires: Fri, 19 Apr 2024 11:16:57 GMT
Cache-Control: public, max-age=7200
Age: 4683
Last-Modified: Tue, 12 Dec 2023 18:09:08 GMT
Content-Type: text/javascript
Vary: Accept-Encoding
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request178.34.239.216.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.114.53.23.in-addr.arpaIN PTRResponse21.114.53.23.in-addr.arpaIN PTRa23-53-114-21deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request91.90.14.23.in-addr.arpaIN PTRResponse91.90.14.23.in-addr.arpaIN PTRa23-14-90-91deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.179.89.13.in-addr.arpaIN PTRResponse
-
908 B 18.4kB 13 18
HTTP Request
GET http://www.google-analytics.com/ga.jsHTTP Response
200
-
71 B 157 B 1 1
DNS Request
68.32.126.40.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
73 B 133 B 1 1
DNS Request
178.34.239.216.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
21.114.53.23.in-addr.arpa
-
518 B 8
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
91.90.14.23.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
13.179.89.13.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
6KB
MD5bb40e21563b36c847bfc03234b2b7af3
SHA15350aa939bac26e47210f3e811999a1382a58967
SHA256debb88caa560aee05467cc54014a8b1094ae5204cc3bfd9e5fe621f26c63ec12
SHA512664126943f190816198b2db415ec07d1a16140e93eaf9b306f07979bca61dc92062960b31324ebab220bad5ca0bd3d4bea5b48a16416d09741198545fd798849
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\de4e1ade-82ec-46d9-89d1-82d5067ce56c.tmp
Filesize6KB
MD51ba74ea913b25f21051634abd8b3e2a4
SHA133ed0db470635246f94ae4d16637f9b3ca602165
SHA256ca6a040d46de9e4fe57e1455f16e8acde43de00657621b3ada7353a40bfdb938
SHA51222043461f9a7daf79e13cf8538b766dd1c23d657d98c74145fd2bd25ba76789519913cc625cce85abb5c62fe792d4be8999981ab5a8f3b6a44c38b91639ab156
-
Filesize
11KB
MD5c8e780e79c2a0f13aa95ac66e1278f21
SHA13a84c4c8b1b63e0bae1291bca74ba1880900971b
SHA256ebd176c44c006e57cffbcac44f82c4d99779109f5c01fef04d8a5bda4e296e45
SHA5120b9c52bbbb9938fec7136a7509a0e13f6c58a9a0a58c27fbd6deb2c1841ba6dc923446e140622abd802ce97a0185650f0b4469cc235506a899d8092ed2fd6d64