Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1680s -
max time network
1684s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/05/2024, 07:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kupka.com
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
http://kupka.com
Resource
win11-20240508-en
General
-
Target
http://kupka.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1996 msedge.exe 1996 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 4920 identity_helper.exe 4920 identity_helper.exe 2200 msedge.exe 2200 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 652 2040 msedge.exe 79 PID 2040 wrote to memory of 652 2040 msedge.exe 79 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 4628 2040 msedge.exe 80 PID 2040 wrote to memory of 1996 2040 msedge.exe 81 PID 2040 wrote to memory of 1996 2040 msedge.exe 81 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82 PID 2040 wrote to memory of 1588 2040 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://kupka.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb933e3cb8,0x7ffb933e3cc8,0x7ffb933e3cd82⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,12992742004374680385,4521073938464105815,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d56e8f308a28ac4183257a7950ab5c89
SHA1044969c58cef041a073c2d132fa66ccc1ee553fe
SHA2560bc24451c65457abc1e4e340be2f8faceae6b6ec7768a21d44bcd14636543bae
SHA512fd5798559f4025ec3408f5550b8671d394b1ec83b85fdac8c005b0cc3e183272bdd07db15a156a572c9c5e5798badf235dc10aae62a052efa8dd9dfdbdca8189
-
Filesize
152B
MD58f2eb94e31cadfb6eb07e6bbe61ef7ae
SHA13f42b0d5a90408689e7f7941f8db72a67d5a2eab
SHA256d222c8e3b19cda2657629a486faf32962e016fc66561ce0d17010afdb283c9de
SHA5129f7f84149885b851e0bf7173c540e466a2b2eb9907d8b608f60360933328cc75d9d1b63640ea4ecc1e64ecc5dd7ee74d82903f96a8b4418ca56296641a8c0703
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5939f8d188d7d05a28cfb2a35a81b385d
SHA11853d21153743c302f23646bf511b71e925cf109
SHA2563f7b3a05f8c9a93046b4c4029b5b8a1a20963eb6f0254b60895b0aaf35cc7fa6
SHA5120e8eca8b4c86404fdd645c82e08cd4cbdf1e698047a51128e84efaef026865e0a2886f231e8868013064cb544bfeb6ca491fffc7533f444827cecff7ac96b67e
-
Filesize
1KB
MD58b52d0a4978314f5540f90a2ebb87e06
SHA1662d72d7558d5f20142dc7068df70b08082de2b2
SHA256f89caafd1e4b249ad75c1db1e71bcb5696b1c827ff2a799997413ae92ffd02b1
SHA512d07b2a31d2858455f521acfacef9ebd9ab593cf815c795302054ab5e99866427ca8a8698c59b7ada0ba422cf682da96befde0f5334c48bebc181e8797ecc19c1
-
Filesize
5KB
MD5fcfa02430c066f81691584be73b3ca91
SHA1f8e585bcf9db802ed1ecbd65ac54f19836a9ce7e
SHA2566f2894e41b2aafa8e695168c2e755ebf0faeb579925cab3beef881bdcb45cb8f
SHA51284c9bef7c089f68a15c1a13bd7f606a8809354175361b20f0d5f491b657cae05e609922fb8cfe1ce7a2aadc5e1d26d5d428ef76a297b731b959a751de5e0a2d3
-
Filesize
7KB
MD5fbe476275c29a5450b535a3a696211dc
SHA14d5df12036ed57bf722eef0cf353d1b5f5440555
SHA25629e99626cf74aa36c68090853d1953d36e048b3f798c351fdc756b8d2dce71ac
SHA5122f4d58942f1a8eb0441113330733e0530a3c4bd29b6b36055262edaab65a7f11bc13ae71bcd32f3a03c32677f1f2e593c40d9823d570e2ed0db0254be96bfe5e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5fc8d6116c61b49de9f869ccf78e582b1
SHA12b1f46e6650e28779de8033bb7a68eb6cae94674
SHA256ef6a5ca14fd6870e47dc66fcc0a485191699651ac54dcd22e5b408dd5f905197
SHA5127fdc75edc65790ace36b18af58d56756945c3b63ff58a2985376c5f7cc2cae6fabc14f2d52e207173f0ebeaaa037601e5861b7d9cd902ac9cc5214ad97af550b