Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/05/2024, 14:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win11-20240508-en
Behavioral task
behavioral2
Sample
http://google.com
Resource
macos-20240410-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4136 msedge.exe 4136 msedge.exe 2680 msedge.exe 2680 msedge.exe 3560 identity_helper.exe 3560 identity_helper.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4136 wrote to memory of 2944 4136 msedge.exe 80 PID 4136 wrote to memory of 2944 4136 msedge.exe 80 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4292 4136 msedge.exe 82 PID 4136 wrote to memory of 4012 4136 msedge.exe 83 PID 4136 wrote to memory of 4012 4136 msedge.exe 83 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84 PID 4136 wrote to memory of 1968 4136 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd2e2f3cb8,0x7ffd2e2f3cc8,0x7ffd2e2f3cd82⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,9972651204217997970,3448432431489503968,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5476 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56876cbd342d4d6b236f44f52c50f780f
SHA1a215cf6a499bfb67a3266d211844ec4c82128d83
SHA256ca5a6320d94ee74db11e55893a42a52c56c8f067cba35594d507b593d993451e
SHA512dff3675753b6b733ffa2da73d28a250a52ab29620935960673d77fe2f90d37a273c8c6afdf87db959bdb49f31b69b41f7aa4febac5bbdd43a9706a4dd9705039
-
Filesize
152B
MD5c1c7e2f451eb3836d23007799bc21d5f
SHA111a25f6055210aa7f99d77346b0d4f1dc123ce79
SHA256429a870d582c77c8a661c8cc3f4afa424ed5faf64ce722f51a6a74f66b21c800
SHA5122ca40bbbe76488dff4b10cca78a81ecf2e97d75cd65f301da4414d93e08e33f231171d455b0dbf012b2d4735428e835bf3631f678f0ab203383e315da2d23a34
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5172a51eafe41ba74c21a471c6133c602
SHA1d1301b9a61ae0512669173a91f6c6c83a2327a48
SHA25672fc7436edcda1ef8d37035e73fbd400faf9bfc3c7bf438dc215828aa012b88b
SHA5122a56f044f1b94c267b5006ef64fc5bb40e0ded4af0466374e0d26b1458137ced9b56a7c6bd7f29ad748f1983914a1846db5038f804e16d4d7091374b41a2ca49
-
Filesize
1KB
MD5a8950c9cb73149dea3f3729179332d9e
SHA17bf9efd9c0c03ff410ded3742db37dc8a8f04d92
SHA25659f8d222104739c0a110c9b5cf44c555fe503c73280d23323ff28937acbf1201
SHA5124648b8a0ea0c4f43233c860f15b638e0399c4d16b23ee5279ffb22be52c8721d0daa10291a555033c8dffce00a9ce7d89727114a2647710d75302222f4e9a577
-
Filesize
5KB
MD5b86ac75d22dff1f8f47b5a2e7c62775a
SHA1fc41a7c2b5c252e309c1d9b54cae2c7e23c5d444
SHA256f40987d5c9e70fbe0683b7892791d3f3f8c926c28bced74504f7da0dde208a87
SHA51253cb49607b3532d7a74fec885322be7303ca3d7048dbbf61e176d23e2d86beae1c449e4f9d37c02358b741ae8969c5fa65efc77984937a4319348ff91f2655ed
-
Filesize
6KB
MD5637445d80993aac92429fa0402bbfe1a
SHA1d9c955cfc3d02bd32067b38ffd8306407d4f9bdc
SHA256cd03cd4832426ce934a05beb0621ebae50902768277ec732540de17fb37de032
SHA51263fb27e0f04b3d33517031fce8f18279cf3b74fb6c09a7707a79376286ed50339721ac9aafca06f6efdc1e0821bc535bbe4fe7d77b4b374b99f452877accdfbc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD501bceb4d15d1f87f91db516fe312efbb
SHA1ff3a4de45137ca1fae6f99d51e7c3d390ac0d36a
SHA256e47d7700bd802aa55f515cadf43d3b0f7759ef641178d6955c0c7d141164c40e
SHA5120b52c9392d8d40edd47b66e7a81c039a0386d7a3e67b79a8bc7dc6527d1fd6a85511f56da348c366a0a2452f142e4bf94be5864624cb7e404928c0ebf5b58c99
-
Filesize
11KB
MD53e50648ba76d3e8fe73b749b16cd6eb5
SHA1e861e937d388093a3558436ba79f320d4f32ac43
SHA2564f28363900e1fce1e93fab6d8844e00ed1a8c7b1a64280208a9d5942518a87e8
SHA512a19ffda5524519b447e6f9273a3817329ad23a7455eb021b6b8b9504937a6cd77b7f5b294a503315823e0eec119c7592af2095c03d795ce9bd840c3ad71155ab