Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
02/05/2024, 15:35
240502-s1kstaca4w 102/05/2024, 15:32
240502-syy8esbh9x 102/05/2024, 15:29
240502-sxcm2adh68 102/05/2024, 15:27
240502-svrn6sbh3x 102/05/2024, 15:23
240502-ssqdbsbg6w 102/05/2024, 15:19
240502-sqaj4abg2t 102/05/2024, 15:16
240502-snk8tadf73 102/05/2024, 15:13
240502-slxh3abf3s 1Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 15:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Google.com
Resource
win10v2004-20240426-en
General
-
Target
http://Google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 2912 msedge.exe 2912 msedge.exe 3632 identity_helper.exe 3632 identity_helper.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3344 2912 msedge.exe 82 PID 2912 wrote to memory of 3344 2912 msedge.exe 82 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4860 2912 msedge.exe 84 PID 2912 wrote to memory of 4776 2912 msedge.exe 85 PID 2912 wrote to memory of 4776 2912 msedge.exe 85 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86 PID 2912 wrote to memory of 1064 2912 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://Google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb042146f8,0x7ffb04214708,0x7ffb042147182⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5775276585175364779,2608898502522476781,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5565af31413bc121d99bf5e0bdfd8f4df
SHA11bda127da85da1f7b1d4dfff83d35895027899ae
SHA256bc9d4aaae2ce4d17f2c519ea80f35f5f80172e8aa0aa3f5339c0cc22ce5efc03
SHA512dc5c173941d74d0a2ec133c253a3d368671bf774589bce5cd699a429b95b200f59a3a5fb9ec8028fa5912bfc799e6073680a03c2ac9ff46d153fbc69b288e0e3
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD5cd26ed80e82019e0920a0bc8022c548e
SHA12844a3bd4c057b67098bf99ab277ac4db2d1692c
SHA256f5f55ea8f54316d35179e2285d19d432d837dd81bfb6de9ef2ec2c43bf5cb0b3
SHA512039d5f9ab8249001f0e39aac0c116a2ff91dd87eaae032d14c78170da2195abe33d7c1005dd01159cb1a332c8a37ae675d97034b065a8a7f897de2853eaf9bb2
-
Filesize
6KB
MD5a5faa38d0cca3531bd003d2afc6d00ee
SHA193ff4fe7282bf73e801913362609912b419ce9a2
SHA25661ffeeae71d3a38d44ce914b2e3ae046febafeb2ada17f6185103ba03f16b6c8
SHA51260649b3141ab03efafafe74c00598122c81dabcba83129de940eae07013e5ebf4edc969dba125490e616584f5e95eb2deb453b4f06c6990fe509b2935f7d8082
-
Filesize
7KB
MD54e9eed156f4f43c494356e9ed8ca725e
SHA19d1e804cec8cd76bf56bacf34d55e9d890581ec5
SHA256abd4cea89585297c784dff1d18abdb0491c99ebadfddea23dc40d1c85557f6e8
SHA51221564617f07c19277598496c88705432ae68a23229fd1c8e352d7460e261542d69e785b80f9fd7a4035522a52d3a6eb1ebbc0e07f85922c3334ab5aa51c1248a
-
Filesize
6KB
MD5cc0e21553bf486b24588379c84843541
SHA1716d4ca685d342a34583f05ebf9619da985957f7
SHA256efc7040824b2da4474eb6259b3a88a472858b7eae791e9dc1a483eca3f69e839
SHA51280d5bae11b70b1af6b3e7fbf7b0a0cc9175ff2ce7cd1ef59d833a2d862f2131f246460e77849f77b395cb1c6d61c99593fe5f4d55f4c88edbec52cd1526e699a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d8d983b6a7e80013bcccf3e0b06ae959
SHA18dd5a69093fb3791fd6fb59ce25c1143b028570e
SHA2567d96e176a1fa9be1cea78e47761250106d966ea15ffb43e4bcf98f37711b10f3
SHA512dbd17ac1df7b17fda22bca10eff42878b153adcf33c9edb5f5d6cfdeeb0ec37f155182206c4af43732279c33653dbcd532ccd1ab3f3bf3418bf585d96653be82