Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 01:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://calcplex.com/downloads/
Resource
win10v2004-20240426-en
General
-
Target
https://calcplex.com/downloads/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 4968 msedge.exe 4968 msedge.exe 1584 identity_helper.exe 1584 identity_helper.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 1904 4968 msedge.exe 81 PID 4968 wrote to memory of 1904 4968 msedge.exe 81 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 2664 4968 msedge.exe 85 PID 4968 wrote to memory of 4204 4968 msedge.exe 86 PID 4968 wrote to memory of 4204 4968 msedge.exe 86 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87 PID 4968 wrote to memory of 3948 4968 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://calcplex.com/downloads/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc840f46f8,0x7ffc840f4708,0x7ffc840f47182⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,11610327333314215419,292348656287340273,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5476 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5edce7151c2e6be7d5272109a02e9ce06
SHA1b6b7c9ceb597fca4f5b2f9b35de2e6aaf1a37b82
SHA25693d60daac2f0a95132286ec4e53f51e3c3c79ee6b6f3e9e76206fb08bef9bf17
SHA5127d70c97e6679a7fd14ad85647564dd115d7c27634f666667cea945e5a1423396e2dd2008f14044e8b14771db8b04368412c93a49a16c078c850192b093b5b1b3
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize624B
MD598ff6a3cc91288a1b4099190ea40cbf8
SHA160c1dc64c9664ef116c2af4c7513014d1d4b10c6
SHA25634225fd28cf5b799f23869a25ab362c3b5d5e3780853a9ffaafef0c4704cf17f
SHA512150e1918c6c007e072989cb9252feb42e803b9073ccd5177b925ce88ad6d0d6993cc3392c8a86dd7d69c529e116cb58d0e679cc32fa85708f7b416bed8dc4fec
-
Filesize
919B
MD554cfc25069da2369ec77206fdfa9dd07
SHA10854123daf3a07697605657c36164d2123e8d3c1
SHA256d1d1d2354906204f56b8b8bbbbc08051b936ea5391d28cf8c8ad8ead26423449
SHA51213288f72f2e53670acdf6edd36c3f147c5557418da95b205d81b750e3427ded48af758d0cd0526ecbb45aab868c09117b9d88387de3abc609eea9f7f5be01028
-
Filesize
6KB
MD584ccf8981e8d76f131de663bd0be9e05
SHA1993b269a7220db41a9d45f65776930af1bf3d315
SHA256f4d1ca3a3e2e70c96e4e75c9bad82204b0a98174e6696fff11ba39923172443c
SHA512fd0370f4912986edd156752809cdb7bca314d519423fe83fb78b43b06cdcc81b82598dcb01f9956d93c3b959cf29dd57c1e4370cf4b8bd54087bcb5af265ca73
-
Filesize
5KB
MD57750e916f714a43808ebf0058f3005d9
SHA140cec8fc0aba83e879c35e7f5ec2d955d9fa5b48
SHA256ce6b6bb7c991063d6aad00ce75245c0f9f7ee3e140bb4b9602eeb6fcaa62d67b
SHA512a5c03d9fab77f039c83cfbc91cd805d11b2019ad9b5758e7cda5722fcb8c558f50eb283db3d0e479c680f8772aefd76a7d648cfbb6e965494a017f776c472ab8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56908fd2b1c2da14995a80d0b78704af7
SHA1311a43be6c59b04ec6215cbe882d6d33ea4c1b0f
SHA256ef9e941a71f9be963ee1b904e2b3623c4ac745558ad320e47cc4ccb5eb1e21c8
SHA512b2617c3b8ceb08ac4fa600a989b851b1faa67cfff14fc3c301fabbe0007ea782181baec0c5d98c628782810dac44c296d7f914b4400847537da6d0f473afc4c9