Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 13:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://magnificogroup.com.br/emma/
Resource
win10v2004-20240426-en
General
-
Target
https://magnificogroup.com.br/emma/
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 api.ipify.org 51 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 1064 msedge.exe 1064 msedge.exe 4640 identity_helper.exe 4640 identity_helper.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1064 wrote to memory of 3184 1064 msedge.exe 82 PID 1064 wrote to memory of 3184 1064 msedge.exe 82 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3212 1064 msedge.exe 83 PID 1064 wrote to memory of 3156 1064 msedge.exe 84 PID 1064 wrote to memory of 3156 1064 msedge.exe 84 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85 PID 1064 wrote to memory of 2760 1064 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://magnificogroup.com.br/emma/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95ffe46f8,0x7ff95ffe4708,0x7ff95ffe47182⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,17133784824011631381,15190689883238004415,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD59327b97e9ba869516307e4e50ee4b7d7
SHA1654a812e84ea243d497afb5aeae6c04075ea8b8f
SHA256a514e52e7ba52fd179d4cf2ae004e10a9544b75e29d61b9e300e3f19aab2e104
SHA51250795b6e4a27abfd38ce6f9e2085925b1ad2ff5303705f304d29227969562bfdef4d9473f1bc5ba49e841927b5ba02da41fe3790a9f479a0e68dc4f86fffca47
-
Filesize
1KB
MD5874551fe76f438234e6c1587d195c1ec
SHA141eea75b680c0a441353f8e5d0436ccc091cf1b0
SHA256c41376532c87962dedeba107ffdfb55a13b7e5fd6c2352168de852202903baf4
SHA5120ee8a82ba185982b80648730cd448a6c199bfd9fea6756f54be678a80e451f2404d90946030492283ee60de63aa22e047dfcae3aeaa8360278f00269c5ad8fad
-
Filesize
6KB
MD5eec060610f49d69fd298eabf8fc276d2
SHA14097e07352f908e9f658bdc100dcde7110626d78
SHA256c59ae9b9b826ed9cf8f5a3adc46210bc5ef6d111ea9c7e43a7ce9cf25096ac4e
SHA512873e30cde738e0b4dc6029110c42ffb61122935499ef0f34127c5d46ed5e2a7b9f94c5489107ac4438fe2327ddab4d4d60cf4c8fa86cbd8da5f62c473914ad1d
-
Filesize
6KB
MD517faeaf47aef8f8e52168efe7ffdc358
SHA13f07987b1e4318f77708b45a6e0d5231787d072b
SHA2566c5dba584b6fc5a695f307096d0132aee0842a75e8c61b0c963476fec441af06
SHA512c9ed2fa295d98d808c489a576f847ae3b05e4c01e14624ae43df13bc16faef1afc0ebd88878d2bb0194b854b7494afb69a01b9eba65cb57f82262f4ed871e1b8
-
Filesize
6KB
MD55022c5af0788f09da5052d56407368a1
SHA1ecc45681e4ad6f93dcab0eafc4d0771503daa96b
SHA2563186581b2ec50b9c9f260c7aebbf447dbe9c0ce10cfbe8fe6361a563fe02295c
SHA512dc62fae0b1033cfce2dd96fd709f0cc90e7c038a2e0ef3deccc5750efbe05aafd076702dacb9b69b49affff97adde8d3a37d23e28d6aba06f68386a603b3148a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e116e4ca99a147a7ee907c3e615e4fc9
SHA1fa13be7726575e00ea79a35ebf71cdf9ed1b5ed2
SHA2565f5f6756b14a124aa6ff18f6571d3fba777f18225186fdde1b497698cd8f448c
SHA512ca5686316118e4d3f659b26eb1358f438906745e68fef11a7ac2281d4af59d40242211ace865c9cb41f72d80763099c98837dd5764a25374fec5910633a7dcd9