Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 20:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app-p360onlinereferrals.azurewebsites.net/LHSC
Resource
win10v2004-20240419-en
General
-
Target
https://app-p360onlinereferrals.azurewebsites.net/LHSC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 60 msedge.exe 60 msedge.exe 3028 msedge.exe 3028 msedge.exe 412 identity_helper.exe 412 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 4364 3028 msedge.exe 84 PID 3028 wrote to memory of 4364 3028 msedge.exe 84 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 5040 3028 msedge.exe 85 PID 3028 wrote to memory of 60 3028 msedge.exe 86 PID 3028 wrote to memory of 60 3028 msedge.exe 86 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87 PID 3028 wrote to memory of 3940 3028 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://app-p360onlinereferrals.azurewebsites.net/LHSC1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd13c246f8,0x7ffd13c24708,0x7ffd13c247182⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2028 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2184 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13774813425283353103,11710113478549903618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:3208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
34KB
MD5ab479dad0018ed766b23130b266ef5cc
SHA1fd68e97bb3f7ee555f5e6ae82a1c9ec466a049d4
SHA256505c692972667c0a308de16a461260619633f7d2ed50f2b5fa82aa3e11124d15
SHA51221106baf9b41aa0c1d4b1dfb652ec3fe4012331a423b89f8cf3169e165c5909adab4c3929e17d602ca99fd186eba0dc1ed6dee130896f305411b9b0d8b330487
-
Filesize
28KB
MD535c1f2d008e885006aa29ec3f0a2e136
SHA10e976e2b8ee3b92a5a1e17d02d2706bc23c5e8e5
SHA256c90a91f06a15304a15e7d80c0f874774edd100c5892c48ab90c9c208ab80f849
SHA5123ac8c11483234a0306a67018c67747857f77a643d7c126efe274142fd53ad6191fc9777a78476e5c95fb798d0e9c2326dce604b6e5e8397355d2223d854b445f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD500513c1cfae1de301f60b6d87e289703
SHA159c6c5ad208d6202af71a8ef4b8375b02e56818e
SHA256a9d953520f77429a90ec47b0ddddc32baa173cb948dc742aea209e6c5ca87c96
SHA512b6d67916f6a43f546d67df43e911f39cc80b591030eae230e3dee3dc26f98d251cf48357208db369f29915b78757b92b765f586eea5f9ed6420766257392649d
-
Filesize
6KB
MD553d6dd561847cb4670a8040ca6429cd5
SHA13fcea06ce60ebfe4da6e6be81b5d1cf0e4bb7436
SHA256143d23e0cd8f6c661e5a34afdef73f7b1031d8f50fd501d39b054bc79b8872e2
SHA512a2064eb875a140e247383ec8e10c53040e94256b5be15f8cca6ca9ea07dc1ced349b80002e341e512338d7eee8a546e9f0ba84d5b112dc2736472baff36caaa4
-
Filesize
5KB
MD5a1536f1e5cc13b32658db3a788715959
SHA1017dbaa4a4cc4f0a9960cb97cbe5b89ed55ed5f6
SHA256db1fee9e0086a9a6bbb819791a3d3724c510d5ab4596bde846cb2c9d427eebaa
SHA512f1b770e9e18b33f2847b07d26f6427371b2f2be86fa608fa05a6724d327d0c5b19800c404ab48e7124567cb7402b0876c19331a3feb120dc2bc746b37eea78f5
-
Filesize
6KB
MD53dbccd84b4529cea619d394e5831625d
SHA18d433eafbe8e9760cecc04ea754dffeaefb0f7c3
SHA2567d09cb6b40c5c1adbf400122bf838cb6406db66b4b3359eb9cf650e2f48357e4
SHA512e1f3a490d34bdc9427da6d19ac00ab200a091db629d3ce1636ab0081deaef67094762ed69224abab8bebbddfc911c747116516959c39b2ee6e93391b24e148a6
-
Filesize
204B
MD597f7ae968116d16a93afa677e0c80810
SHA1e1dd510f976c88cfd9d8c2fe06cc40cc66efba89
SHA256dedfb6400ca90143e530e04475a83ffcbb5c8cd99cedb57e033f1dbacbf1c08d
SHA5120d2bc24a95f32e2aa340145bb8003e0eb7febdc3438d83e6fdcb058e870a5d62c3fc2f77597db4b6dca7862a9cc46e4951383e0d9cccb1215f5e81e113c60c2b
-
Filesize
204B
MD5886a281094b6605efcc343508da7d4f2
SHA1b0ff4f84db8e1b58b91f38e985b7a2bd1810d50c
SHA25635647f80034f568c92610b175af29afc8faec664eea54331ce18b7f79a787b87
SHA512a0314cbfe912f32c0aebb66a1744f9502091ba1032726d9688cbc6d2eed185c4e138031b8a1b0306e582b3bbee0326d5295b7e4728ed34aa3caf724888429c17
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fb3ed8ce09eebec32299df12239e9f53
SHA153188cac04ed2d17882ff18a826c2ec5ce6c2e7b
SHA25626e26103c3f4dd3cffc51292ec5062c2a2eb4a5b32367575125d36c998a18723
SHA5128004084ffed422ffa09ea5c189d9930cdbe09b70b41d9d4345c9ba21fb047a1aebd24ce4917e2f5de245eeb29e449bf559b95fbae0d48c3402090f01fb400ed1