Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/05/2024, 18:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://uploadmix.net/sophieraiin
Resource
win11-20240508-en
General
-
Target
https://uploadmix.net/sophieraiin
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 3872 msedge.exe 3872 msedge.exe 2792 msedge.exe 2792 msedge.exe 4836 identity_helper.exe 4836 identity_helper.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3872 wrote to memory of 1840 3872 msedge.exe 79 PID 3872 wrote to memory of 1840 3872 msedge.exe 79 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1252 3872 msedge.exe 80 PID 3872 wrote to memory of 1584 3872 msedge.exe 81 PID 3872 wrote to memory of 1584 3872 msedge.exe 81 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82 PID 3872 wrote to memory of 2448 3872 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://uploadmix.net/sophieraiin1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb933e3cb8,0x7ffb933e3cc8,0x7ffb933e3cd82⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,11035237451383513542,9749996529495104418,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d56e8f308a28ac4183257a7950ab5c89
SHA1044969c58cef041a073c2d132fa66ccc1ee553fe
SHA2560bc24451c65457abc1e4e340be2f8faceae6b6ec7768a21d44bcd14636543bae
SHA512fd5798559f4025ec3408f5550b8671d394b1ec83b85fdac8c005b0cc3e183272bdd07db15a156a572c9c5e5798badf235dc10aae62a052efa8dd9dfdbdca8189
-
Filesize
152B
MD58f2eb94e31cadfb6eb07e6bbe61ef7ae
SHA13f42b0d5a90408689e7f7941f8db72a67d5a2eab
SHA256d222c8e3b19cda2657629a486faf32962e016fc66561ce0d17010afdb283c9de
SHA5129f7f84149885b851e0bf7173c540e466a2b2eb9907d8b608f60360933328cc75d9d1b63640ea4ecc1e64ecc5dd7ee74d82903f96a8b4418ca56296641a8c0703
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5dbda816ef8fe295220a3d45988de79f7
SHA1bc7eeb41fc5883af87d027d4d325b4302802b0e6
SHA2567654e21916aed435e3e0474134ceebd35c50624c5fef802c4e77a15c8ec53847
SHA512db42f01f31974863e37cf38a63643858d57363b4e8b4d6c2230918a0e71168e967eae88ddf71f9b0a51d4975dd9ef79cf5f78e17a997e138ab35b60b6929db33
-
Filesize
1KB
MD56a10f46cc890fdf71d8ad5ec7e69c241
SHA1325863effd791c383df79800265920bda7a9d821
SHA256f929710109b0a32843ab31f3db543766ff728f19b102409af79ab53e148b8689
SHA512c2b9fc933bafa9e19c930f7b1f154da8d2b4ff74d639a9bdf7a080d6d0dfbe931a47c67e3deb0678efdfc56a999b0738f171dfb87ad50674305a204c3558b5a0
-
Filesize
5KB
MD5fa0d8329023234a1d6fa63a4c610d5f0
SHA11a7f41864f75cc89a538440f92431e5805b30f83
SHA256001da04107b898e33468bb7b6fcc5be2ed1f31f1818212577a639be3da95b6a9
SHA5122e46c25bca998dacd958cb90094204e663f36a0ebf3670e78d5335db36877ef8cb1acf6a87da21ba7741312ab3ebe662d255c7d91ff5e825af1d70fff4806b62
-
Filesize
6KB
MD52da28a551ab37934a120a69e056fdc81
SHA1bbfd18ed22655953581eba28479fe7c731f13716
SHA2567bd8240c8a9b7257f6e25e1ed2db98e05d38cbda7442c0d481c3c2ffecfc81c5
SHA5128f509c0db807dcaf90f74e80ce15b0049bd32c3a59b54c3787df9bbbcc7494149849f0e7ed1fab17ee8f03778d3a40bd8c74e1f8ed3fa53ba68bbf018cce1798
-
Filesize
6KB
MD5acf0978ebd48bdfcec01db822f008d8c
SHA15155cd935587883003a7fb9e448f421ff4c1019c
SHA2564ad5d168b328c02780981a4ec7171c7fca1450c066779a364d3f5663ba009025
SHA512e1c22bd160cab639db2ec50548db3a446e782168776ae016a86a3c186998c7956092c2aa50e70604a63595ed1aa2e5fb37c5944a36a5e50f5683d13fa722561c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b0dbe9585500c1c6fe2fc52f8f8489ea
SHA1e48fad7dfff04f7f5a53c24443fb518a96c5cb69
SHA25641fb68201ef35d2bba2e21ad66dc97a50aa8e3ba824309939d0956dc1e35ef0e
SHA51242c764097029ccab5b351c26c6228a8359dec3bcc2bace2ce7085a4e040ecb61678e04a56e77cf189133de39fb544eac8a45b9cd570e2a7a07bf8663b8bafeb0
-
Filesize
11KB
MD56fbee86d596f806b50c2fd5d93c861d8
SHA1005645e75e7ba66152a8c5d663a05605de9559f2
SHA256f703a4bed03a0efaf33efe0937432c981f7172e0ef69b44fc0e30e9557554562
SHA512af933540126d20d584f3a51097ffb12204a3c6541366090ee3d1be147c42839af7dede6aee73b7e3f6c242ba1ccdc650f936e284180f9b2d977bebfd24adf177