Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 22:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secure.login.gov/events/disavow?disavowal_token=OgyV0eDya6bSiWymDBicL7B2-Q2eqZWEeSbJBDwYdsQ
Resource
win10v2004-20240419-en
General
-
Target
https://secure.login.gov/events/disavow?disavowal_token=OgyV0eDya6bSiWymDBicL7B2-Q2eqZWEeSbJBDwYdsQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 1052 msedge.exe 1052 msedge.exe 944 identity_helper.exe 944 identity_helper.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2340 1052 msedge.exe 85 PID 1052 wrote to memory of 2340 1052 msedge.exe 85 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 468 1052 msedge.exe 86 PID 1052 wrote to memory of 3028 1052 msedge.exe 87 PID 1052 wrote to memory of 3028 1052 msedge.exe 87 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88 PID 1052 wrote to memory of 440 1052 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://secure.login.gov/events/disavow?disavowal_token=OgyV0eDya6bSiWymDBicL7B2-Q2eqZWEeSbJBDwYdsQ1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff297346f8,0x7fff29734708,0x7fff297347182⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15411239104156179645,6081615141439154271,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2620 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5cb5fbb56d48de2fe983aaac530fd514b
SHA18d09d379f0ce2c3042c1233714c3da4c6607d5ff
SHA2561e030317f42136cef6afa3a4e4ba62bf6e964ceb7aab1f270c2caad279aa4597
SHA512b321074f381fe124c83316863a944c8af4db889237246baf21f25eb1b59eaf077cdf84896cd444331795aef8065d1fcb858df6f6aa019a30e5f186a45571cfad
-
Filesize
963B
MD5c0b43f72eef6e3de1843eaaac14d1cb7
SHA1d5d20711aae2123226bf305a05449bae51147193
SHA2562b0a04a8672b3132740d180285cd34fe88176b8cce35c460eb5e2e65e9f0eb2d
SHA512121dff413b32fb206106369cc71ca8cfa4bfc1751ecb0f4bc220ac0bcf7e63b3ecb2f85048accbf0382f1c2789d586d75301c24494ac4e63e12614f3a8d623b8
-
Filesize
6KB
MD51b16ea96a04e6fc87343d56172583630
SHA18a49822972e566a99045b25dfc56245411512043
SHA2569b7de7f320da39546fb7c36b25c1fe7157ff2f741e7d76decacbac916291bc5d
SHA51259085380472246105525945e2203d76f9e222f4bc0dfede180715373a9fa38915b76c13b1f9bfd6f51cc8a1ec8f07dc2d87e4509eed00e76077b0efad739c5e8
-
Filesize
6KB
MD5fb55ec75662e8a3a47b81bdba5d4a9ef
SHA1e9bb8c1719c962ed2545fe8a153e76b521d8509f
SHA2560ef3d41e8633000c988e1b8e19539a8b5dc4049c6cd524dd5cf1dff36907ad80
SHA512332db5f19f42ee574331ebf2fcc2a51dde4ba093e8ab63d8e239c59f0f43dca2255724e9b8e0f4dd5b6447ce7c6d10a0880bbdfcde711bf82bbf727aedf0f6e5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f34cda07d71a5f1bcee523bf5544a57c
SHA1ffac806145bf4707c04b0c1249d7639d852457b1
SHA25617c0dae1dd2ce7f7c89765c68ab68d8093bf47c6660bacc075fad621fe4b9184
SHA512af72233889fac75f3b79b4d07eaf07f8c263b67fddf6b5c200b51beef103c2e3c21b7c1bd2f7a4a5b29c38ebdff816e55402023c07895ccff1ed33b94758ca79