Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
480s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 12:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://brunettemattersrefused.com
Resource
win10v2004-20240426-en
General
-
Target
http://brunettemattersrefused.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 3132 msedge.exe 3132 msedge.exe 2196 identity_helper.exe 2196 identity_helper.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3132 wrote to memory of 3376 3132 msedge.exe 82 PID 3132 wrote to memory of 3376 3132 msedge.exe 82 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 3500 3132 msedge.exe 83 PID 3132 wrote to memory of 2016 3132 msedge.exe 84 PID 3132 wrote to memory of 2016 3132 msedge.exe 84 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85 PID 3132 wrote to memory of 2680 3132 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://brunettemattersrefused.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc030346f8,0x7ffc03034708,0x7ffc030347182⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3972 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,8754141557873502415,14416242638183488619,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD552e82bf164e1a1dee969d98d90210f89
SHA182f96773cf9abc08591ee66a1281f4ef7904917c
SHA2560b1c2b8c425166a65182402a84d994769a1089be65f5af53a27ab10767fc64f0
SHA5124184a302cd62ad1f85bc294c8f5fcd00af79c24a54841f018ba009b4b46b82901e4f028fb13cf5657377643aab05cfe2cd28f629913c496ea43b358162d3efa7
-
Filesize
2KB
MD5fbbb02a11fbb51bf86bd661a883bdbfa
SHA17074336634289a05be41937e6c97e8bb223a2069
SHA256b5b67601493a02d750ad891daa56d9971ebb1d50bc5dfe00e9809a9542f28ee4
SHA51272192ed70fb8b64ef84c9904b2c81ddad1f5968f75948e7e2f4b03825ff537ea39b6d60395eee1e84bd081e20a8e40164c93916b67107d2dc0d92dd84d685403
-
Filesize
6KB
MD54857c4d3bae1d0833bae4c75d615b2c5
SHA1513ef2304c5582baae14cd8f23d3066279a21637
SHA256f5567f6effd8ace0f27e07e3348458b4d58441628d9626a5dc268430e4ef8ca3
SHA512f08d63954bedab4e96a185aba8c0f706b56f1f15ae11b7d6d408fef448af9b12ce0f361a41865f7c1ad974ee9978b3800f4aa20073a4be33f4ea58a152077136
-
Filesize
6KB
MD5bad0ed7e50fe8de942af7231048f1bc6
SHA1c8068aac7c8206d8d6e83b8e4498b3c1bf7a84ef
SHA256b763f9701ddd337bad0f9975f2ca21791935760528efe156fb574e91730acefc
SHA512b05a9cb659fe5cd8f7deceb630722979272a4abd083d93a84fe4d78ddf5b928aac265b408c18862d0e020621e81cbd54915653543284612cd409a1ee478d6b32
-
Filesize
6KB
MD52cbb8610975afc1dadbb8781acc7db85
SHA10218446b1a74f00a78127fcefd37a58132363c07
SHA25660869a8df8b7b2b8470d5f4fa1a66a0e9e5f8b6864266cb5b7d83e80eb216ac1
SHA512ea0765db1ca35406a941706409d3476b412fe5841f8519d4e7f7c7a95aaa3b815ddea62592fdbba6e68bc06e1fe1879b12e49f1b40bf94bbde0401dce3c8c351
-
Filesize
204B
MD57422cc5974dd5636c7fb519d7093a19c
SHA1bb6842df1b4e84e64f0237025ccbbd7a1dea3a58
SHA25643a7886e5a966330350dd204e96c9936e92ddda18b051def33900e23f5b044af
SHA51234cf9701fb4d6c89818ca9ae307457c1b1c2fc52e590791128fd7fa8adeaa13a54bd95a4ce851dcbf735350ed1f5c23ecdc360ff06414601761ef25323453ce5
-
Filesize
204B
MD5a9795ad3ecd9bec086828f66af17b48d
SHA124ace62e50092ce35bdca0a2e4f2640a66a94db8
SHA256a16f97b3d52347b868fc7a1a8b64cde0de0b0bfb93937e031d0254d27fe91d97
SHA5129fea90ad5109abc9b3af1dc8ade74302714954b105b8e9caea35fc8f62b171fc6d122b8894a475f41edbc5640276a7a0771bb2a58675028a12733d1028c673b6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56523d13e603917870264fc16744af246
SHA1b310692f68d66aec7d5ca5e91410e566cf74a45b
SHA256e8f5db32852195286e06342e13374884ce82466512e24114097ea245db888bf9
SHA512ec4781992d12aa383b78f90f773585bd32da7070ccceecf78170e9b236c3bf28dca541baef8728589f060bb6f771230d6c6aeb731b6e989dd02c17ea8f393340