Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
FAQ/file.bat
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
FAQ/file.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
INVOICE_UWB872.lnk
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
INVOICE_UWB872.lnk
Resource
win10v2004-20240419-en
General
-
Target
FAQ/file.bat
-
Size
793B
-
MD5
414720fbf4f23b0b60cb16b1286f4fb9
-
SHA1
48a6c2520f3ee5babd7c506562ba470fed53716b
-
SHA256
d92433da2959be279c18e55b59ce0c65a387c981d0223fd727ccbb54c845986f
-
SHA512
fa7f0ddb96deeb5bdceb57127857ccf4ac4d36ad8bd4b01316bfbf225b9761939949714cb57c97546b9048746e96de14da64fd5282bc5e80b8c6d6f078348a8a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 3692 msedge.exe 3692 msedge.exe 4264 identity_helper.exe 4264 identity_helper.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1000 wrote to memory of 3008 1000 cmd.exe 84 PID 1000 wrote to memory of 3008 1000 cmd.exe 84 PID 3008 wrote to memory of 3692 3008 cmd.exe 86 PID 3008 wrote to memory of 3692 3008 cmd.exe 86 PID 3692 wrote to memory of 3000 3692 msedge.exe 88 PID 3692 wrote to memory of 3000 3692 msedge.exe 88 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 3060 3692 msedge.exe 89 PID 3692 wrote to memory of 4636 3692 msedge.exe 90 PID 3692 wrote to memory of 4636 3692 msedge.exe 90 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91 PID 3692 wrote to memory of 2708 3692 msedge.exe 91
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\FAQ\file.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FAQ\file.bat" MY_FLAG2⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ariamedical.ir/.well-known/style/yourinvoice.pdf3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffefc9446f8,0x7ffefc944708,0x7ffefc9447184⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:24⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:84⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:14⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:14⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:14⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=5060 /prefetch:64⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:84⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:14⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:14⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:14⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:14⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,497744850133007765,2281478707322935808,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
433B
MD5f9fc1cca0c8f3f22233023b8da08ea60
SHA1a95a7ef895551ba0b71c7ed38f529f3b6c58e397
SHA256eccd22dcfc158e27553196016efd8ee372c6c514dc944c579dd3818839c995d1
SHA512c27300422f2d3ad01959bddf4c53ac7c37fc133a3725f922c57db0f747855bd8f984e2b7ea1ca24c427e08c4b04443347d83645721da575944d55903399117e6
-
Filesize
5KB
MD5d861c4effb7b269a9ca5d405978f1c0d
SHA13b51872ddc55c52fe698d8cc032eae0a44ab9c1c
SHA2560d8707287d747f13e408757efa5c8ddb3e74b2bf478ec90222c21bf33d5d98cf
SHA512032cfac4b968f74f7283cf52d80253e2c194ac68f450e08db3fdcfceec5fb8042a0b4f98718e5fc8063263b075fce29b3e515bd61ec0d23c827709163b45a2fb
-
Filesize
6KB
MD526569114bd6f46fa887f6c9aba903756
SHA1051b68b5f66b1ce4a3d0e387353b3455ed0f236f
SHA2569b8b610e3ff06e70768024fd7aaf788481b6ebba147e3559340f522710ff3a2f
SHA512121b6e6b767bf3fde3cc269059e6d71bfd1757c3892a3f2398c72fdb1e0e3516c7c81ed14aa8de6ba62d94cf4fa351b709c549d378bc56c650561de0e1ccdf35
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54d324a776cda6ea3c1568a3fe039a641
SHA134896a085218086dbbd8c1ab77fbd77fc4d3b769
SHA256fae9c80a0bd40a54502cda609c92240528620d957a5b3253ae9834122a1d4847
SHA512acafdf9b47d757138b4e29f37681773ced0ab997cf80c61ca9a83cf02c60ba4f9013c8757f33524f44b22a4634d8c694afb358cad6693b188cc9a9b8bdc05131