Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-de -
resource tags
arch:x64arch:x86image:win10v2004-20240426-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
16/05/2024, 06:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://elegant-crisp-d21ad3.netlify.app/appeal_case_id/#2037837825
Resource
win10v2004-20240426-de
General
-
Target
https://elegant-crisp-d21ad3.netlify.app/appeal_case_id/#2037837825
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 4588 msedge.exe 4588 msedge.exe 3644 identity_helper.exe 3644 identity_helper.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4828 4588 msedge.exe 82 PID 4588 wrote to memory of 4828 4588 msedge.exe 82 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 4252 4588 msedge.exe 83 PID 4588 wrote to memory of 2432 4588 msedge.exe 84 PID 4588 wrote to memory of 2432 4588 msedge.exe 84 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85 PID 4588 wrote to memory of 4904 4588 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://elegant-crisp-d21ad3.netlify.app/appeal_case_id/#20378378251⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86f4e46f8,0x7ff86f4e4708,0x7ff86f4e47182⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=2092 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --lang=de --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8962228110658344565,2233194106164717614,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD572bf7af788acb7356533242e3062fd19
SHA15ab6c5a45bab5cacee364e2658526671e446e9f2
SHA256394c1d45c0149e4defa0ddf3050156336c4ccfb29d2c8d84d73757e3849cff82
SHA5128a00e1639e94fc052fa8b48f8fe7f9de4713691cbd13cc8adb9e91e8c3658cbfcf7b7d5a7a02a84f8f6bd3c7ae0924a896dd3228af6c27f9f6e9e0efada467d2
-
Filesize
309B
MD55b562ae07d4cbf4ff82d800459ea87f1
SHA1f43670b899752549ca96d39b609da67c28c09d9f
SHA2560129e0e50023b50c1d17431e7c618e6c1ee1738980e605284f36b901704350a7
SHA5121a98c4327f1669eb99db54766d89593ae34874a884df3652a1586e470c39070b8d874e57f811bd10141d4fabf89a162d7b1a5700dcb531168de802c4ba88a03c
-
Filesize
5KB
MD50c2944e30df39b2d31050fb523691a23
SHA1c3eeee7d632dec557c4f1fc6c3655f8d27d144a7
SHA2563b521dc3a8321ec6d6498eb903afd7073c47771b41e49640685d47699d701d4e
SHA512a10755148c9b5322877963727c09d9762842d60a69358df8d5089542a2406b80e54f4ff3d9863d46cb7c2e19a9075f13d9884ba8fb703cd014b0ce1be9eaaf11
-
Filesize
6KB
MD58252c59a27d1826bea7aa2113ecbebc8
SHA1a2d328a31f6cc7a4c4cc6e80c32e634fc42c94e1
SHA2565be00a4a2faa90f710f34c68ded35161cb4b03224afb4fb24e2d11e6f5640027
SHA5123404ac7dd9b8c0b3a42e24ba66225438480a27bd9775298e245c5710459e84a2aa6e3d54388d038d637dd68d822b77915d92e0d7ddbfc54a48de62012ecb16c5
-
Filesize
6KB
MD590bdd7804c5f07d797a5952abec02a1b
SHA1bd6511ca3b9ad0a652ab22c16d612412dbaa80d8
SHA2569d984f9baea05813a3391e982001d79845ea92bfb452ff95d8ea8e99254636ed
SHA512a54c1ca2fdd380f1e9fd77f896e69807ebba67f45b24a8b0524588500e8932b4a5ebccf0e1d56c11e76ab7f35793f5dabf85239cf2fce6c7e9c7c6e96adbf9fe
-
Filesize
203B
MD54cbca676a15a97d47ebcf9cfb9bb0e90
SHA19769175f81e7302ef87113c54122f72d29143edc
SHA2565400911a13e7fa2e98c853e8a17f5168d6cb70c6106d7fd5651d89fc275d9fed
SHA51299128647fa519662d1b776edab38ff371bd351358f7df458b09406034c0646a2a66fbe4eadfa22cb7eb1c8e4385493b41a3b288a1e61dd2550e07df665e5ff68
-
Filesize
203B
MD57c0d44dbda89187a07077945b8154b61
SHA1b3e526059f068c0ff917fb338cc9ddd9d355df47
SHA256ca13de85c074da5531f2d07f0e0472d9b3543bd7f7996363fd13bc90a3abcad8
SHA512163df5be328151d4ab367b0c4703b00204b61c1db6cc740e15e1c8b78395152fdc5b1aaad8d9d5702ec8630e15f74daee1eb06509ff4d4eade12883f30583eeb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59c48093dfc97c4ddc09a7083f55263ac
SHA11e8a072fd441d6ed98043fd1e37756dc0576f386
SHA256d28f26bdbfa63c9bdb5a117447792973c5c9d18752e77e7fe45943299333acbc
SHA512e1b8495216c92fca5e5df4f4bea902a42086a3f7c6513c00d475e0a0b8336768494417bc7c96f763b23aca4e528b4d387a2ebe8b7787b1000dd194d073d3bf4c