Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
264s -
max time network
261s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 06:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://downloadmoreram.com/
Resource
win10v2004-20240412-en
General
-
Target
https://downloadmoreram.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 4408 msedge.exe 4408 msedge.exe 4664 identity_helper.exe 4664 identity_helper.exe 5144 msedge.exe 5144 msedge.exe 5144 msedge.exe 5144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 2748 4408 msedge.exe 86 PID 4408 wrote to memory of 2748 4408 msedge.exe 86 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 4820 4408 msedge.exe 87 PID 4408 wrote to memory of 3376 4408 msedge.exe 88 PID 4408 wrote to memory of 3376 4408 msedge.exe 88 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89 PID 4408 wrote to memory of 3268 4408 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://downloadmoreram.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd07546f8,0x7ffbd0754708,0x7ffbd07547182⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:6016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3433177503206327833,16638521153086524361,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\737c415a-870c-4ed0-be63-89963c3b08ff.tmp
Filesize6KB
MD58717d8b6263dd5b30321d303fcceff86
SHA12baf58478f818f502aaa16a1ad1456be837aaa3c
SHA256943ab64a3748729f6c6427fb5c40942f0ae4ec877ba489976287304c7feaecb9
SHA512c808f420589c8e2b179eb94e103f0b434531fbe4d7ffd2f711f09d4acaf453e5c1b5964190b3e256290841e5e2b95e4907a261a6c1d4c5215c5474a35083163e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD524b5406f05314d342948f5b81bb31390
SHA1846c4d6321a32149bc664dd93e6cd7795c778981
SHA256357cb651d135696a4125ad5502143cb363ea71658ecbf72efbd12d880d76d614
SHA51211a76eddeb9aca64276302dabf47aeb2654651eab329cfc78615baac00f4ed3a1071ef194561cbf3690de4e6f1c416b02eaad7562a6ce200fd1f8f294c828574
-
Filesize
1KB
MD5e2fadb19deefa352bf8b5dcc3ef85941
SHA1440ed2570c272cdded72ff2f5ac7b6e56003c7ff
SHA25637b40b3c29507701086133b7056c5d3a251a33231899bd0b073f70e21248274c
SHA51245c164c338bb6c218e79d31ae251691e5aa3fb70fb631b47e6d543c1eff835f48bad7d2bb66d2ccc64dc87e15b415642b268ab5fe923fff55365de3969243124
-
Filesize
1KB
MD5bafcd3e2f1b5e8c4c6cad36386c92980
SHA10af6734b75670b9f6d5d33c156c7709041319d4c
SHA2561fd6a16f5c43aabf65e192e837ce44bd4943e821c5628ed52f246244590c59b4
SHA512ff15b6d7dd3bfcfc3b0fd1314b625320346909bbbb926dbd97986f4db913e4d7beaa87eee0d1b76eaa9f4bbc29309e37e4d1e1736443e3d292c8421ed60e17fe
-
Filesize
7KB
MD515fe55143a30da59491f79b4a3984f8e
SHA116f30214eadaf12769459d3c97c50a59f3e5c21a
SHA256aaf2fc4d7bbcb593435d8af727b0ff055ee3a167b1d73a5fe925a24be4b3028a
SHA512ad596b72f421c66b4dc3f60de4ddd6dda194b565c64ae22b0500502fa06fb094c15855bd57bb67577b3921da607ca4fbe63c2d4823c74847ddc7fdaddd3aaa01
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54e0acf3f621a14b59564cf6b5e9ece80
SHA1ff21486efba0a5c544beeca931b1c2503a4dbc9b
SHA25617ee22b41dfad7a9c8206672aba3a7729814f69365850695797d99eb894ef4c7
SHA512d2a24368032655e52ce7d979cdf293d3c22d3bcdc763f7053a4bf2412538fe2c2dcc01ff5484b0ed2e94904a924a6fb71d7c8eb9d80260bf3c7e4f02abba8352