Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
8URLScan
urlscan
1https://srnetworkcon...
windows10-2004-x64
1https://srnetworkcon...
android-9-x86
7https://srnetworkcon...
android-10-x64
7https://srnetworkcon...
android-11-x64
7https://srnetworkcon...
macos-10.15-amd64
https://srnetworkcon...
ubuntu-18.04-amd64
3https://srnetworkcon...
debian-9-armhf
https://srnetworkcon...
debian-9-mips
https://srnetworkcon...
debian-9-mipsel
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 04:40
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://srnetworkconsulting.com/[email protected]
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
https://srnetworkconsulting.com/[email protected]
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral3
Sample
https://srnetworkconsulting.com/[email protected]
Resource
android-x64-20240221-en
Behavioral task
behavioral4
Sample
https://srnetworkconsulting.com/[email protected]
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral5
Sample
https://srnetworkconsulting.com/[email protected]
Resource
macos-20240410-en
Behavioral task
behavioral6
Sample
https://srnetworkconsulting.com/[email protected]
Resource
ubuntu1804-amd64-20240418-en
Behavioral task
behavioral7
Sample
https://srnetworkconsulting.com/[email protected]
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
https://srnetworkconsulting.com/[email protected]
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral9
Sample
https://srnetworkconsulting.com/[email protected]
Resource
debian9-mipsel-20240418-en
General
-
Target
https://srnetworkconsulting.com/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 4556 msedge.exe 4556 msedge.exe 3940 identity_helper.exe 3940 identity_helper.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3948 4556 msedge.exe 84 PID 4556 wrote to memory of 3948 4556 msedge.exe 84 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 2076 4556 msedge.exe 85 PID 4556 wrote to memory of 3460 4556 msedge.exe 86 PID 4556 wrote to memory of 3460 4556 msedge.exe 86 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87 PID 4556 wrote to memory of 3752 4556 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://srnetworkconsulting.com/[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e61746f8,0x7ff9e6174708,0x7ff9e61747182⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3011407837219937200,13410804186812869179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:3556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD578fa78b35ad1bb6ee717702918d2c130
SHA150b1ab18391ee8032ed67b6472b02487fb70c717
SHA2563a934feb8068966845877f9fe1abc1d75a84de9c6987c1190782179c4a4aef01
SHA5127c56e0325c772a6a99dae23998c9db93832abdbd240f36927b7531ce723dbd86c6a974febb8fb1c2f192a417cc2b766bee87915457919220bd2be816f3f670d0
-
Filesize
6KB
MD53fa18455b34e210f9d512cb0a34eaa63
SHA1150d1d494ce3d4c790824c04ab1b0db3c15f863d
SHA256a3877d0b2ff41f2355dffde1e87650293bd5441d4c5dd160ac8841af085330e1
SHA51205901c09bb148231a0192af83916eeff561f32780930293ddb8572400230f20fb7e031599f066188638230a1c57d61b333df7bd5e9b595635a481188700a7284
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5046e1140102e85987d4aa8ee8998f209
SHA121f5608b4bb5942312b8354e384c839e98105b51
SHA256428ac55775f7810a903164779622be9c0b9a66fe11e8d4e728c06d65990e13d6
SHA512938232815f74f5b888930d3fa489f49db2fe30a8a0ea29b52bbb7ffd7f2d8b9c2a21f400cd766f17b61c8b38054415fba8fc9dd499bc8abd470f1a06718e0dfd