Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
24/04/2024, 20:16
240424-y184asgh36 824/04/2024, 20:13
240424-yzgbwsgg87 824/04/2024, 19:31
240424-x8tg5sga96 824/04/2024, 16:37
240424-t4vymadd2x 8Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 20:16
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fluffy-eurevercurly-ipotential-octo-winnernventionbose-gui.pages.dev/?gdfhjmdjfbyhdhfnufbtdhg%[email protected]
Resource
win10v2004-20240412-en
General
-
Target
https://fluffy-eurevercurly-ipotential-octo-winnernventionbose-gui.pages.dev/?gdfhjmdjfbyhdhfnufbtdhg%[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 3476 msedge.exe 3476 msedge.exe 3004 identity_helper.exe 3004 identity_helper.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3476 wrote to memory of 2584 3476 msedge.exe 88 PID 3476 wrote to memory of 2584 3476 msedge.exe 88 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4404 3476 msedge.exe 89 PID 3476 wrote to memory of 4324 3476 msedge.exe 90 PID 3476 wrote to memory of 4324 3476 msedge.exe 90 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91 PID 3476 wrote to memory of 5080 3476 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://fluffy-eurevercurly-ipotential-octo-winnernventionbose-gui.pages.dev/?gdfhjmdjfbyhdhfnufbtdhg%[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffead546f8,0x7fffead54708,0x7fffead547182⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,6342064086943131331,430955190937457350,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD549dee2d84a24be8774baa9f5121215bc
SHA1c6b74f35f9df476951f1dff9f0466802db824d1e
SHA256ad1e109ed4bfe3b3633baedadfec41464fd409d4f2f4830ecabbe91273588fe3
SHA5126f77a00407dc0b353cb175c7a65a7d10458fa2bf35785db3755f315b01d9d617bc72620b147c5cc08d4a5448d2190ca2662977f9ddaeaeb9c82c00275b703a2f
-
Filesize
382B
MD57e97ed9715541e9070bef02504de5510
SHA16ef0b662e29da6ba83259865f7e23d84e5155acd
SHA256106046daefd2cf6500e549ca872e770e11a8dc4981cf3c43c9741c9469db1e5a
SHA512b8851ac123cb917734b35a90b4e47dfd89d3ba8e575b87bd3a24895bdc2f0a99e8c4ae260ca8b96ee886c2b56eb41901bb0108df4488aba075d571ae2c91448c
-
Filesize
6KB
MD5fe25d2ac64e5883061e56085cd57ea8e
SHA187ccbe6ed8f21fbb317b11810ca17940232be3e9
SHA25624bf9a05bc280f2d4999e48f17f2ebd174584c131a6f33d09e632710c311c2a0
SHA5123ccf0c77ec13fccc147ec6ccaace22a425f45122052ce681c966abe1f3d9a3e4f34938c6040d8400c93a2e02c656026361aa52a79151d88fe5dfa160a6546e5a
-
Filesize
6KB
MD5730420ccc96ab29ad5f1e990f1bc3a69
SHA17af348e8cda3ad1059c9371aa3d3f6cb87b2ef14
SHA256697e6a38f7d6501a18531c3eeec226b22120f4de4356e597a0ce77c9f333339f
SHA5129df91cf7855aefc7341dadb228402f54bf0fbff517ed30cedea98c5550f9df82bbe1a1c2a7746fefa7ca70063ab4a8cfe015b592500f6f4b98af1b140d0ec660
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55e0601d2fb55e50a6e2c76feb8a4171c
SHA1b5c02c6f306041bd30c5d2f5e5120820863a41a3
SHA256a40e1fced6e8c39da2e846f51ea810fa46bdb12c3e6d573e6e78b77d67210fd9
SHA5125f116628ffee2a1c8a221388464d908a200b46365e6a783896371805ceb942c6427ac92d091dff04753c426df4e2f8ee023e417b7befc0aed18eb9d5b24de7ce