Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/04/2024, 09:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.gg/QadNbSCe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://discord.gg/QadNbSCe
Resource
win11-20240412-en
General
-
Target
https://discord.gg/QadNbSCe
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 11 discord.com 13 discord.com 14 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-834482027-582050234-2368284635-1000\{3DA9501B-CC50-4CB1-BF81-DA96F825A8B3} msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1764 msedge.exe 1764 msedge.exe 4800 msedge.exe 4800 msedge.exe 4772 msedge.exe 4772 msedge.exe 4036 msedge.exe 4036 msedge.exe 3636 identity_helper.exe 3636 identity_helper.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 4968 4800 msedge.exe 79 PID 4800 wrote to memory of 4968 4800 msedge.exe 79 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1980 4800 msedge.exe 80 PID 4800 wrote to memory of 1764 4800 msedge.exe 81 PID 4800 wrote to memory of 1764 4800 msedge.exe 81 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82 PID 4800 wrote to memory of 4548 4800 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/QadNbSCe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa090f3cb8,0x7ffa090f3cc8,0x7ffa090f3cd82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1832 /prefetch:22⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2520 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4776 /prefetch:82⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=2924 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,17398329767249444949,13357055907345641608,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50fcda4fac8ec713700f95299a89bc126
SHA1576a818957f882dc0b892a29da15c4bb71b93455
SHA256f7a257742d3a6e6edd16ac8c4c4696d4bdf653041868329461444a0973e71430
SHA512ab350ca508c412ff860f82d25ac7492afb3baf4a2827249ebc7ec9632ee444f8f0716389f0623afc0756f395cf00d7a90a0f89b360acdf72b1befe34eecb5986
-
Filesize
152B
MD521986fa2280bae3957498a58adf62fc2
SHA1d01ad69975b7dc46eba6806783450f987fa2b48d
SHA256c91d76b0f27ccea28c4f5f872dee6a98f2d37424ef0b5f188af8c6757090cbb5
SHA512ae9ba1abe7def7f6924d486a58427f04a02af7dd82aa3a36c1ed527a23ec7897f00b0e30f22529e9599ae2db88e8abc7ba8013b426885aa3c961ee74678455f1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize864B
MD533cf230c91ea3889aa7b152707557e5b
SHA1e36d6e80f26ac401556ca9fdaba2181ddbb15db0
SHA256193852e05f790b1431462d37ccc44881eb7f520d04905fbea17addaa35024818
SHA512e67ae314247ef3b648b2ce27c35e6c41ac8f453f1b0b57f855aa3981480ce4607f8c58c013ad87dbc4fd403248e7b4fffc6a00c4d6962c7831340486c76aa9be
-
Filesize
323B
MD5a5a1149047729a493b1a2a65063c39ba
SHA18f1f45cb0c0772dcd05795734cbf408636fb9fb9
SHA256e0ef1f906ea2606c802310437fe799d93e073770ab6549060ee4b9c9c49f2006
SHA5128ce257a087115e2d542657a2b4679d0c100ebdec76e3392cff1bbba133e129f2fcdbd73f9baab92e762bef47a2572d3dc8553fa3858d787d2a0b2bf8f05dc54e
-
Filesize
5KB
MD5a89f78403b301af404a458bac5a2588e
SHA12a3a4e8c21b8c6c4f2c0ad021fd0d8aa79fde0cd
SHA256d9f040971155f4584485ee3e36da24378d73c46bad2cdb771e96f859d4641866
SHA5123f4f2fe47cb6d3669adb5563c4a5ff6038fd5b218574559feba9ac5788f55bb74b093401221fc1dc47d71a5a63b4a846e1f02d9376706ae1b1e2450c489802a0
-
Filesize
6KB
MD5d556e90b6d09c50895b45cacc5b875c4
SHA17208febb811cb31f550956cb0247d0b798647301
SHA256b158b717ad6443330a292a701a16f1afc8ee41630a62ce0075cefbd9e1b15f17
SHA5124502876ba36297ef4c3133848b2bc63313a7cb277f271728cfc7eaf1851137d4c936477443235634b2a633714338329a6e076da934c4e0849b9397a92443a365
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD550d50a278016eae70ac3f3c8fac61887
SHA1482441aa0073984302620bd32675596b70892550
SHA256372d5284e9e3de32fcb05d4c45dcacdb49d1187877bdfadf7f47e3003b2960b8
SHA51247bf1fe3dadc5f71fcdcd407e1f168b7516b9dbbd4c5f974761583db117ff81a21cb2e5a87563851e62b3dd2702ef3854ac85ad55352e60f2b551c83e1a4c4f1