Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 13:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.wenwocixwqiefwonirwi8.info/
Resource
win10v2004-20240426-en
General
-
Target
https://www.wenwocixwqiefwonirwi8.info/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1752 msedge.exe 1752 msedge.exe 4192 msedge.exe 4192 msedge.exe 4404 identity_helper.exe 4404 identity_helper.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4192 wrote to memory of 1980 4192 msedge.exe 84 PID 4192 wrote to memory of 1980 4192 msedge.exe 84 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 2348 4192 msedge.exe 85 PID 4192 wrote to memory of 1752 4192 msedge.exe 86 PID 4192 wrote to memory of 1752 4192 msedge.exe 86 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87 PID 4192 wrote to memory of 776 4192 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.wenwocixwqiefwonirwi8.info/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb65e346f8,0x7ffb65e34708,0x7ffb65e347182⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:5840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3880364943336675839,3850633000939971877,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5d74113c97e0e014d10ba292f6ac2f2ac
SHA10d2e4f185eb5df2ad0f8dc4042303e853fa9768f
SHA256d3542a0745df151c61b8439d4f72e0374dba5f7bc313bd38d6010395a96dc8a1
SHA512bd10e0ef60af6cac65a1869f44a1779afd3b110c97c1f58f2b73c29e15349cb653315818a837efa5c3fcde3b1a671ac7edb0884bf4e4424be4a201a7ebcf1551
-
Filesize
3KB
MD5da0cb15594405cea419c883165a7f83e
SHA14671213254b192e24a72f910fc78ed0e9e1ec7ec
SHA256d00fd16bc6ac4d7edb4a78d314b427c5233b5842ed26a6d002cbd17fc554ace0
SHA512ed47bba3f93515c6f21ba53a82a63d0f90444044e8e7661d4c73cdb6f245ad3c8949b1d544b56f081d498825fefbf5ebbe17ef595cb2ebd13cdc621ac6b4927e
-
Filesize
5KB
MD5ff22c3643036e619c85ab55cbf2ce989
SHA1bfb653a6dced0863e9381219869f384d3ed5089f
SHA256a27bdc9113c5ec91ac1dac55e2406fdd8dc9871c43cb46c7baeb75f6a5956995
SHA512a906fb737cebca2725d2bdec1ecec7d0f2c4572718df681b20ac748900bb87f56e359212b41640943dc6285566d6b5823e3af13160afbc4e35d8f8116f25fd05
-
Filesize
7KB
MD5cc3cdd3df3214ca8a8cea59d39088d5d
SHA18304987bb06306d8013246542af0b8c9cfeeb201
SHA256dfb51a4b140b20022d0b90c402c5c5f5e2afdabecd733a761c7b79e48d62b766
SHA5124cac43effe6675ce1f74d0d9b4cbffbbaaf06317154631826229eb92bdd0cee451665246bf90b036d43d638fa88ea8cff787a256eb1295d19dfe6aa501f66486
-
Filesize
7KB
MD58a3e77e28bd8d1fca6054fcc0ce86f40
SHA1f7ac825b5602c0d68edd24c4a969319385bfbd2b
SHA256f67891d8f3a69837b9fe4bed77edba5a850337a137bc09226b41df2093f421f8
SHA51238002bf32e4addd8079f77d2c7ec4d6f864b6abcdbe5f58d58d0b3acaec41c47266123021bbfaaba951ad257b4ba4ee15648889be950de74331a3830222e12b7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e03efc15ddb8cebea849e3aed4919b22
SHA11cdf18d8c4888d319c374c5c7bfb3c11e7d410b7
SHA256d0eb6421dd9b5ba84c6d2c4a6b95b725e4e5bb7e2b38927b050f46285133a639
SHA512d2cc7a1866b2bafff7a683c4fed6a5e8ab158e1bf6831c1c8f8bc2353a24422c94b7b6a4c07280e22783fa0421ec2cc91bf620689558ce27b31c2fadad5cdaa1