Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
libquicktime_plugin.dll.svn-base?id=3053a167982e379b031fe9fbe2a1d57c23026a90.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libquicktime_plugin.dll.svn-base?id=3053a167982e379b031fe9fbe2a1d57c23026a90.html
Resource
win10v2004-20240412-en
General
-
Target
libquicktime_plugin.dll.svn-base?id=3053a167982e379b031fe9fbe2a1d57c23026a90.html
-
Size
7KB
-
MD5
124bb7a6ca8badfe01f1a303f2b105f9
-
SHA1
140f7cc83a114c4ec6b354860abe399b32cbba92
-
SHA256
4c617b75dba77e8befa18761522f3e141d4b4f9a3eb7713c34e004a709caf898
-
SHA512
fc8337b44165f0fd07b07da32dbcace25c4cfc11c41a130cd3f5196ccd4ce7cf9a4c8f4dd73ed02316e2d91ea0b779c39628e656efc62cafcd5ff68446362474
-
SSDEEP
192:ZrvTPMcMHyx1Qvlv/nv/dVv/gvCuv0mXHP5BxUxv/vvST/lo3fQvvFv/NvTvavLH:ZnPMcMHyx12nd9dmXHP5BxU5yT/2C+nN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 4940 msedge.exe 4940 msedge.exe 748 identity_helper.exe 748 identity_helper.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4940 wrote to memory of 404 4940 msedge.exe 87 PID 4940 wrote to memory of 404 4940 msedge.exe 87 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3976 4940 msedge.exe 88 PID 4940 wrote to memory of 3156 4940 msedge.exe 89 PID 4940 wrote to memory of 3156 4940 msedge.exe 89 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90 PID 4940 wrote to memory of 1992 4940 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\libquicktime_plugin.dll.svn-base_id=3053a167982e379b031fe9fbe2a1d57c23026a90.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4b6346f8,0x7ffb4b634708,0x7ffb4b6347182⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2536858523440155011,2588617845501672417,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
6KB
MD568a222c7676fb3ccbf1d8bb6c432e98d
SHA1feeabc05cf6c0d9549d72c60774db76ad93fda0b
SHA2561e78364257eb7862e30779e8d151e8d4e6afc9936a5fc0c46e739fcfcabe1c47
SHA51274109c40b8d7b3fd2c8c2bc8edc458667c81eb806e4ef51fb9a0c6af15c36325abf6da292307b68135b899e800dbe6cffde6d87a0edbd7206ce897521c716448
-
Filesize
6KB
MD537ba15a8e10ef9c5b8c0e6c6e746cddc
SHA1154724df18e3b49bef913fbcc1dea1acb769c5bd
SHA2569c4c78bce90d2cb638ddda484cd60dfca5a8eb7d121e26d0bf00f284de6e3a06
SHA5121c98f7de65776b9caec2b10cadb69569f0d5b12b84320c294ef0c9252aa2d6e51987b98db9af6e19da3e6ff3727afda88c6a741f00d30b29b22f2ecca122a678
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD545c1732e54dc304e4cf6902224729ef1
SHA19231f37d21f50accdd9d827ce3dc3a0b3994fa3a
SHA25626b7c645bb0feec6452d467e46c53d637e71fdb76dd02729c0099635019b5a21
SHA5122119d9e3cb2b4fde05e97a261f9848b1c6d71d2f60a669291911313cc830892f6b39580faa750f5a63739f4be026714e16cc76110c7ea34280de0ebca6f3c731