Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 12:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://thermal--solutions.us
Resource
win10v2004-20240412-en
General
-
Target
http://thermal--solutions.us
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 4764 msedge.exe 4764 msedge.exe 2828 identity_helper.exe 2828 identity_helper.exe 5320 msedge.exe 5320 msedge.exe 5320 msedge.exe 5320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2956 4764 msedge.exe 86 PID 4764 wrote to memory of 2956 4764 msedge.exe 86 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 1856 4764 msedge.exe 87 PID 4764 wrote to memory of 3744 4764 msedge.exe 88 PID 4764 wrote to memory of 3744 4764 msedge.exe 88 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89 PID 4764 wrote to memory of 4716 4764 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://thermal--solutions.us1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7bf246f8,0x7ffd7bf24708,0x7ffd7bf247182⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15930689118808137332,7985881456122460573,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a9519bc058003dbea34765176083739e
SHA1ef49b8790219eaddbdacb7fc97d3d05433b8575c
SHA256e034683bc434a09f5d0293cb786e6a3943b902614f9211d42bed47759164d38b
SHA512a1b67ccf313173c560ead25671c64de65e3e2599251926e33ce8399fde682fce5cb20f36ee330fcd8bb8f7a9c00ef432da56c9b02dfd7d3f02865f390c342b53
-
Filesize
152B
MD5cb138796dbfb37877fcae3430bb1e2a7
SHA182bb82178c07530e42eca6caf3178d66527558bc
SHA25650c55ba7baeebe1fa4573118edbca59010d659ea42761148618fb3af8a1c9bdd
SHA512287471cccbe33e08015d6fc35e0bcdca0ec79bebc3a58f6a340b7747b5b2257b33651574bc83ed529aef2ba94be6e68968e59d2a8ef5f733dce9df6404ad7cc5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD56dfd58496d8624226a0113679091f04e
SHA165e0c8c6161185c8e810eba5f463ec7259883ab2
SHA256226167f54efef3ecc918a0729e6ca783f086d13168ad77e6f4113473185c4e2b
SHA51205e2c51b47ac68600ad83278d5e65fb119ac93b3828df77f734335fc7b2376657ef2e6632930c61a00e06e8bfe279afd20080d3ecb2a40c845d1adfc90bf5e19
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD505d612e4f496bc4ccf13998a3d443a2a
SHA12eb44943e5d2f15975297539c4fcaefc0a7148c6
SHA256852710875a05313eddf06929545709c2077f65312c5e09acf447644d4831b987
SHA51245a6fe6f9ec04e4e000dda3e9d863e22db3613d77128ac416e91787b67c76079e9045734adab2decc81a5fc90d9aae91684be71b073e9efc423d59d715246ffa
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
535B
MD52fa4cfc939a44205f78c6e9964fde28c
SHA1a70e201a6157024a53058ea4245ceb935ee96e48
SHA256f0cd4e3dfaac1ee4f7f52cbd6bae1e1fc28647486891436f4044436dd9687756
SHA5120056f9d3c16f25ed1aa58e070fbcfebf71bfcfd48e6604eec2d83c4f076fec9cc42de22cb36880708ee2d7a3d9ee8f30bef25170b0add46fb561155fe68633cf
-
Filesize
6KB
MD5e4a4bb5ff90d01063829e646fffddd4b
SHA1064a8ffeeaa6a2c1f017776e08e735d98966a259
SHA256570409556cb60894566e5fe91485ee7a37a633bc9b2ccf680062fe5d4d45833b
SHA51248d3d6571f68674e2d3a3b16d44ff6d901beb06396f78816ef61a7e60b756a147a923e38e97d63095a1a589c94a9f5ea00df8392ef3f11ed73eee7db8223f1a7
-
Filesize
6KB
MD55e535aad5f5cafcbea209d53c68fb61b
SHA1e4a96b77e04f5d4feaac68c02babc889706dbd5b
SHA256ea58848660efa3169aad5b5dae7f0b346f66223757424136b89812ef1380dece
SHA5125d78433f64e0cb02ef8ef6dd760d57ef079dafa16f3520e37f5780c460d803e36860f087ac15318607a82140ab30816291f9369eb3811f72999ef00ee0e4a24b
-
Filesize
6KB
MD5aa1d5732af93168b871b2b9ebb974327
SHA1d0ce3ced6b07973e2b5277c89f7ee0e78fe2c916
SHA256ace359613865591098cfa5a62cb74034e38fb36315bb723f16ae2f873ac47618
SHA512a112980ccaa351bb3076505d7f0115d7bc11aa6d66eb61e6d48b153175ef3d79a128609535a9833d223f41f38a1f4f6810531d5bb7a308c6254f1e1ef4562283
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ea370b36-4391-4153-9346-0b42ce022df0.tmp
Filesize6KB
MD540b5f35cc1891f520cf2487586fbfbf0
SHA18fa94ca8896e78970072a525b494ac6b1683529b
SHA256b654b9a628df86df4e158552b5cf0e33a303c0e747559eee5908ad988a3bf833
SHA512043e170e37a808209c41c1f1076bd7300b70f3d5bff4cf9cc337668484c10c43779b3df00e7c9407bbeccdb1cf128584b3c3ba61238aa4449de808251cac414b
-
Filesize
11KB
MD57f1c0dc62005c8a0908eae7ca5484813
SHA1703da983bdc0b68e5c0b14480e402cc62ba1e00f
SHA2563399e6014241f43cb89785d88693f81acd3999141e1502d0c9c45e96fd591987
SHA512af155201f7664668c7c4add8f3a175a9b5b19bcede11f132cf4862e6e92cb78222a2681bbabe43ceda3bbf0732b93a15ab3be53003440bb55fc639cebef56fee