Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 08:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamunlocked.net/
Resource
win10v2004-20240508-en
General
-
Target
https://steamunlocked.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 1804 msedge.exe 1804 msedge.exe 3420 identity_helper.exe 3420 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 4388 1804 msedge.exe 83 PID 1804 wrote to memory of 4388 1804 msedge.exe 83 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1392 1804 msedge.exe 84 PID 1804 wrote to memory of 1976 1804 msedge.exe 85 PID 1804 wrote to memory of 1976 1804 msedge.exe 85 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86 PID 1804 wrote to memory of 2752 1804 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamunlocked.net/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba6a246f8,0x7ffba6a24708,0x7ffba6a247182⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2573831207203389599,7592811527670654274,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:1376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5e55e4feb8adcb3b532b954dd6c1fcf43
SHA18084e122dce13650372f61328304dd69920a2336
SHA25613c5b7f7bf7b2832d21bbd600bc0d7558310f7fef0f5685deb525becbf8bcead
SHA51242cad782b58427bfb78684e5ad3d953c812fc5997a81ee86cb6f47d9724a5d1d03ed3a47cc1fc3189f8416e1b829f6344006387fe81fe6302f9bfe9eb78fd24f
-
Filesize
1KB
MD574d218acdc7f245fe56303d1497c64b1
SHA17439256bf188f983213fe907e23c17f246b21bdc
SHA256456c28c4765b14d66453aa07e9e55eff199d77d1af3499303c3bf74a24aacd8f
SHA51283af381f46dbf01970d3e6ef8048ab2175eb1ebc43c2b11e5ec6247cb15fbf5f470a203cc6dcfa196419f43d28b06a477114d17836437fd02fdd86e0372d8396
-
Filesize
5KB
MD55b4cd6b47a06144f9a9d5bf57e3f0a3b
SHA1dc84b2e19e93740657b23229a2facf58c766b5fd
SHA25618de6fc78726ab89a23e1617ff29ee58a5776baddeb2349a60d7332e4e840658
SHA5127d3070930670d0782e34f36c310bbed3bb4f3b3b7520a230c64b4c05f37b260aa8263370775c9a1d69992cc7a0de07ccc805d8cd7bb6be6046d3e7cc9f2277ba
-
Filesize
6KB
MD568827a34f7d6aa639c07eae53884ac79
SHA1589f75db2498e5d003fcde0196d7cd9754d70d33
SHA25602651649fd0228f99e7e7ad4f0c0e42cc2f0f3c80b11b13e4fbde170722eecad
SHA51271134e8a6c57c138e7956c6212d113b6e870e4466f6c603dcfaa7a151fc3d9af9f19ab42814406151df33a6208360fe73da2775a76c4508d81bfd1636dca81c6
-
Filesize
6KB
MD552e1aaf905f4b85486991ff05ccc04fe
SHA18ddff85f575b3971511ca438712b44ab3d9bdb05
SHA256ae38e5f899ca35d2afc6fb77501777357f484af1d58c4512c2b4226765c622e0
SHA512ddee53ac7b2e0dc267eb4e227b7c300ce2df1393fb8a2903c7b2bb200e20a47ef9baf521206505861e9d8ac7dad9f94d16cd8a58b00696371081e9b1b8895c63
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e6e19508175d834815ab305ab4feb56f
SHA1f8e5b7866cdadf8aa4377a7ea8d6deccedb5740c
SHA256d2a5641b38a30aea4fc04bc2a9c9c226ae572cb8aa6dfead6565d13c43586e14
SHA512d3f34bcdcf63118beb039a21e5c95759d546af263114afd316b8dd23801c2bf91b3d39a06972cb77b58045998dfbae96ca69430166e1827f5c024216857a55e7
-
Filesize
11KB
MD58fea631751d2d7093f05ac44fec74c66
SHA1344ae29b63a31c6eda016032f10c8ec8f0b0b58a
SHA256f37e6de4ab1403d49df78f045947520ab4021b1c3f460ec47403aa3a61aed7d4
SHA512556e44ade1913451e76fd0f1169f222b002b6dd90a67a60f63c1e5eef4b4f82356dbd9a0484590b544815004d6462f584b66baf498cc09cf0a05b71a054d8e1d