Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
960s -
max time network
967s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 16:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20240412-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 3380 msedge.exe 3380 msedge.exe 2784 identity_helper.exe 2784 identity_helper.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 3972 3380 msedge.exe 85 PID 3380 wrote to memory of 3972 3380 msedge.exe 85 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 2240 3380 msedge.exe 86 PID 3380 wrote to memory of 1960 3380 msedge.exe 87 PID 3380 wrote to memory of 1960 3380 msedge.exe 87 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88 PID 3380 wrote to memory of 2112 3380 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa000046f8,0x7ffa00004708,0x7ffa000047182⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4862419499232391984,13697100976821967661,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5416 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2353aa78-d18c-46d7-acc0-9ca82b3e346b.tmp
Filesize6KB
MD5db204015be68f646c6011232ae65a6c5
SHA1ebe3b0abaa7b334ca454c2c5152c620394ce43ef
SHA2563f071b66da8f01374805835af1558f6052755d5069f1ab8d50733cd87e97c1e5
SHA51243571a788db2d52e2dc47963f0b30775a027f4bb47bd3718a5bf673041ddf5f40d540b9509ec885a6c70f25af4e00031d8271d5c3180596ae2812d028b49c95a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5eea556b5f338594a897b4916a4f2192c
SHA1f0ed56d7d6814aaf37112d4e69907583033c7d47
SHA2568acf20b2e97fb8640189ad43c734104144b4144e39f9e57d730669c7271eb46f
SHA51208d1c7a79fd01cba758057a5e0e18bab628149498bd448e09561006ed5ea4957346b7951169883bdf9bdce22e503e1ab715c6775824b79c49418ff871c820467
-
Filesize
2KB
MD540a2c182a516af97b8cfd2c193b06f20
SHA15bcaeb235c4dd1fffb771a28f963df3a0cfeb64c
SHA25669cc05bf36b2518064917b0c576acdf52d01eb0c669a5d3eec81f89211b8313e
SHA512f724c4f28f19461c6d4f773a6a326d1680652ff4bff515d99a3b644ef97e372f64f6cd33086da9266ee2e8790d365b70e9418be623cd5086fde881fe0713d274
-
Filesize
2KB
MD5333661183e82aeda38d472b765643b58
SHA1f0e225a2437484bcfe28a873b6f1f6dd16384ffb
SHA256bf871e84b901def3a26baeb6b3182833b3dbf0ca0d55496f3d1625d829774fb9
SHA51249973615fac450b2d07632a187c0bc360abfd424bfaf57db2dcb5ff2fb8af1bbfd149269be9d10a3b7012e0e2e003d4190cb9ce2aa8961d264f58ec8e8c39df3
-
Filesize
6KB
MD5ab2d0f6a797ba16d405bcd953b7507b4
SHA1931823f7c6ffedbca4b7a2c4cf033ee699c238fb
SHA256f1803b6ffbe5c7cab0a072e9dbd5e11e59771eadcac792f591f89c1b461b137d
SHA5128f0affb3726101b8e98bfbff651b3dcbc3025794bdcfe3b6e0c3afce3ff6b76d477c0158b94cd83a81b019d0c9c37e4ead9ec13c1365ec1bfe6bb970a0a5a077
-
Filesize
372B
MD50bc782cc5ffb7db468161f62dceff1b0
SHA117034b333f365c1487caa5c120ac4ef1e8aedd4d
SHA25688206f336d43d311d0e1434595256a9a1c723dc3a04969b5520312545afb0243
SHA51206b5d621d722744d6bc2622da69773e63beeecdad50d93b9861d45f636bc565f71bd31e69927147f06e9a44f314b053187b96ad990183b308c85dccfd867838e
-
Filesize
372B
MD5a6fe8f8efba095c3972e90c6022bce52
SHA17b3c04fe66accaaf2e2d8b20a6a8955fd3b20569
SHA25639fe91bb661d9ee99abdcc33d8148aad09ff401b56abc04fa2a02430ee9ecd80
SHA5126f1e0f30eb8abe67917a61793cae4edcb34d2625950273324b920635fcdbfb90a86d7c5355be16826eecbc38c6ac18bc3d42897d2f778dc9aa20f8ab66869a9b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f1e6e23a57e778c6f000cfc4756364cd
SHA122461db5f8f41bb8fb964602d47037a99ed82b47
SHA2568bc6e37938faafff59cdd002efea0fe45606d9f4110952403d771cb6c2245e25
SHA512b36abffd64870a11271b1877ec5dfa41b3ba9acab3a924b210aabdcf9b31edb3b419afe7fde05793c1517d8e06ca83bddfcbaed855e8f831090ee92f5cf5f5cf