Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 18:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://support.docusign.com/
Resource
win10v2004-20240426-en
General
-
Target
https://support.docusign.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 3660 msedge.exe 3660 msedge.exe 1216 identity_helper.exe 1216 identity_helper.exe 496 msedge.exe 496 msedge.exe 496 msedge.exe 496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3672 3660 msedge.exe 83 PID 3660 wrote to memory of 3672 3660 msedge.exe 83 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 2360 3660 msedge.exe 84 PID 3660 wrote to memory of 5052 3660 msedge.exe 85 PID 3660 wrote to memory of 5052 3660 msedge.exe 85 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86 PID 3660 wrote to memory of 4948 3660 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://support.docusign.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc77946f8,0x7ffcc7794708,0x7ffcc77947182⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,12009050394535131716,14701586715468594670,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD551515477db3a5f0dfbaab0b21c3622da
SHA1c5ff912aebf1068ea532a490c2391c2434f3a763
SHA256e54577ea673230e9552de18cc4aa0b66893a6a4a5cf0bdfd30a4bfa4ac807065
SHA51260be38c71e885a377e99aac06d0dc2bc0f988c3dbe45d86188f2096c638d5cf124ab52850c33251cc138c9ea16351e8b54f5730c6e33163eeb22461ebad64657
-
Filesize
1KB
MD5520a9b3e6e40ba054c9852a0177f723b
SHA1fd2cea8738a1099e2c1a95d2f7b54b296c3c0e53
SHA25634ee630afbb422df126d1fe2f22b0a3089419af3b11da177e99f136c6494cb35
SHA512a08cd1cf4ea33feb311c298eee06541de9ab02cb74da6f8c6ed8943d49e5ed14e4b4ee9c67dd14f05a418c2e4f362135461b8c71521976490a7b541748789a9e
-
Filesize
5KB
MD5483c6cba34e9346b1828a0d653c609f4
SHA1f0d2e683250b503af8bd755a4ef176580298722f
SHA256f5e703f619d630fb7d7f3b4d21738c6bbd5df67743deb859b4df0a9da135e8d3
SHA512777a450691544ab4be5a693445f6e045070dbf34adc6afb84b51e1fcd100ff175950d39d959e9364ff6d62a61af4e48c8f627dc5968a89d0b33c98c30f6082e3
-
Filesize
6KB
MD50ff6c18588aeea5db6b46b80891607ed
SHA12a21bebe962e269f0c9ec160824ddd51bf3a757f
SHA2561346b51a17ebe8d25be995fa10563a2a67a6aad4f07a1faac08578c0540e14dd
SHA512defaa07a8bd24ea7cbe2ac6261b3928df77b5c8b76e7509c72c623c3dab20789eaaa5ea938854608c8a1532fb05445a0872cda83da87a68e558579ba0045d706
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD57f2ee61de35bb3ab3b960765e9f6d42d
SHA10fbbadbc980451be652f797f7fc3c5671ca001c9
SHA25624e8b57cf73cdbb34dab9d5f655617d1072dcf108db8be345e1745caa327db47
SHA5124f740147a45a7e608af0caa45598a19f348c438ff307c9d0c11b26bb9b6ba4e8f3224bb7286e026808c1d14091690353c40de15069c0ca4fd80ee061f4097657