Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
4Static
static
3BetterDisc...ws.exe
windows11-21h2-x64
4$PLUGINSDI...ge.dll
windows11-21h2-x64
1$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3BetterDiscord.exe
windows11-21h2-x64
1LICENSES.c...m.html
windows11-21h2-x64
1d3dcompiler_47.dll
windows11-21h2-x64
3ffmpeg.dll
windows11-21h2-x64
1libEGL.dll
windows11-21h2-x64
1libGLESv2.dll
windows11-21h2-x64
3resources/app.js
windows11-21h2-x64
1swiftshade...GL.dll
windows11-21h2-x64
1swiftshade...v2.dll
windows11-21h2-x64
1vk_swiftshader.dll
windows11-21h2-x64
1vulkan-1.dll
windows11-21h2-x64
3Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/04/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
BetterDiscord-Windows.exe
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/BgImage.dll
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240419-en
Behavioral task
behavioral5
Sample
BetterDiscord.exe
Resource
win11-20240426-en
Behavioral task
behavioral6
Sample
LICENSES.chromium.html
Resource
win11-20240419-en
Behavioral task
behavioral7
Sample
d3dcompiler_47.dll
Resource
win11-20240419-en
Behavioral task
behavioral8
Sample
ffmpeg.dll
Resource
win11-20240419-en
Behavioral task
behavioral9
Sample
libEGL.dll
Resource
win11-20240426-en
Behavioral task
behavioral10
Sample
libGLESv2.dll
Resource
win11-20240426-en
Behavioral task
behavioral11
Sample
resources/app.js
Resource
win11-20240419-en
Behavioral task
behavioral12
Sample
swiftshader/libEGL.dll
Resource
win11-20240419-en
Behavioral task
behavioral13
Sample
swiftshader/libGLESv2.dll
Resource
win11-20240426-en
Behavioral task
behavioral14
Sample
vk_swiftshader.dll
Resource
win11-20240419-en
Behavioral task
behavioral15
Sample
vulkan-1.dll
Resource
win11-20240426-en
General
-
Target
LICENSES.chromium.html
-
Size
5.1MB
-
MD5
6b84319ee8a0a0af690273d3d2dcbaf4
-
SHA1
857ca353e0582d100dcbc6cb6761bb4430d0cb90
-
SHA256
fc2a256467fb4d4ff72be6c423e5961e98b418554deeec296aded0e757b9a585
-
SHA512
26f9842bfdb429ef132cc1a930da9187071a339927eda402e8d54b5eb9e03067612cdadc3a2dad3d0977f8e6af18c05eab6ac91720221c6a0104f96638f85a8a
-
SSDEEP
24576:yd97B+mnLiLsrDy2VrErjKCqzkU98wwg3QeXuh:0P+mLAqHBCuRoeS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 4944 msedge.exe 4944 msedge.exe 1096 msedge.exe 1096 msedge.exe 3100 identity_helper.exe 3100 identity_helper.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3856 4944 msedge.exe 80 PID 4944 wrote to memory of 3856 4944 msedge.exe 80 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 2252 4944 msedge.exe 81 PID 4944 wrote to memory of 3124 4944 msedge.exe 82 PID 4944 wrote to memory of 3124 4944 msedge.exe 82 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83 PID 4944 wrote to memory of 892 4944 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdac733cb8,0x7ffdac733cc8,0x7ffdac733cd82⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1804,4421875787736549779,12350641468237567922,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4432 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50354ef8afd53bc4c27ab99144970a9c9
SHA17105316ebb6a50dc71cc5402c64bba847a7c95ae
SHA256acef151efdca7eef151e0cc9e45d5945737c4ab7cd8493e3dd9acb49d8df6020
SHA512af6d8f1010ab8181c6cbe4c64a0d72c20ddfc56257cb862570c410546ddc52d2f1a67e58b93e7548573091b0e7173f230868c28bc6ed0abb8116f850f7122893
-
Filesize
152B
MD50f25425fcda7474bc74cf6b914ce2262
SHA1541620b08eedb97ada0840960b2c59391ba9a530
SHA256b170ac8e893bcbc87746d28c5068393019160b9f798db01d364812cac69f1cbe
SHA512f4c7257d8729f6d6338872ca36ed128349944c9efe8989dee267230e5ebae8675a3fba3ac3038a88d5b70977b767eee0c2423481c526ade354fb335592d80b7c
-
Filesize
6KB
MD5834384c8e414e2cd03ba070c48e97ddb
SHA1ebaf5a90e049885faaf338dc0a8acfafd46da05e
SHA256ae04087b94be675eceff34597d804041076e4f2b7b36c9b75850d477c4a587ad
SHA51267ec5f95edff2d58fac0d77a12e3b849e065399e756e22e5ce0195f36dc9b913e5b58095257ac994a3353341c2e2ffbd8cbd8eb9df34ad3b836bf36604b25f12
-
Filesize
6KB
MD5935e5fabb9264e634e3ef4009f3ee3c6
SHA129845b2b2876ffa946425f3a5d0b5ce0408fceb9
SHA256b93870134a4c2ea741d685f8465c05cf531fc93ac74dba6c4a33dcbc59ad55b2
SHA5128264515ebfcc501dc37bd9870b4e56d859005001ce266bd6141d989d16c1b6351593d9974406621782c6a8aaf4ae5c5d47ea55bd35ce6989eff3cb08df694cda
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5a613874ae33dce1bc74bdfbb79af2f6c
SHA1fc7528ad492bec029b5c2c840abf87a0795b8493
SHA256a0290a2e2c96315f2d737787b21a65217f421053f64ff73da21f3783493d5ad2
SHA51257642a1fda82b0b896af5e0bd5319595357c311f14b183c2cf354347f21146b411aab9cae3f62ee0607be0b447e98f0efa77dab5652b254afd7329e5f1064f10