Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
204s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 11:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.virustotal.com/gui/url/220aecd817a6ac637e0e97ece9afd45ff0b4b7a1236b051cbed1192e3cdea91c/details
Resource
win10v2004-20240508-en
General
-
Target
https://www.virustotal.com/gui/url/220aecd817a6ac637e0e97ece9afd45ff0b4b7a1236b051cbed1192e3cdea91c/details
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 436 msedge.exe 436 msedge.exe 3092 identity_helper.exe 3092 identity_helper.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 4640 436 msedge.exe 83 PID 436 wrote to memory of 4640 436 msedge.exe 83 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 1740 436 msedge.exe 84 PID 436 wrote to memory of 4056 436 msedge.exe 85 PID 436 wrote to memory of 4056 436 msedge.exe 85 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86 PID 436 wrote to memory of 3248 436 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.virustotal.com/gui/url/220aecd817a6ac637e0e97ece9afd45ff0b4b7a1236b051cbed1192e3cdea91c/details1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedb2d46f8,0x7ffedb2d4708,0x7ffedb2d47182⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14219582172318015310,2893197826245635694,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
206KB
MD5f998b8f6765b4c57936ada0bb2eb4a5a
SHA113fb29dc0968838653b8414a125c124023c001df
SHA256374db366966d7b48782f352c78a0b3670ffec33ed046d931415034d6f93dcfef
SHA512d340ae61467332f99e4606ef022ff71c9495b9d138a40cc7c58b3206be0d080b25f4e877a811a55f4320db9a7f52e39f88f1aa426ba79fc5e78fc73dacf8c716
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD57e8f1fef5fe43604d75c3f88f044ed94
SHA182faa9dce97e23ef411de5738d1859df2668abbc
SHA2566335620db74c409134cc82e90bf9425293919dcfd526188f86d5408a2e48e5da
SHA51268f6f7f450a1ffbdba1923165be41ee0aa00633e7c7d80fcba1f65318a5cad5b2024ee140e9941602dfeb1e6237d9b4b655809aa811dd6ea462fa6b422fb0ad8
-
Filesize
1KB
MD572c255e690fa9675e40a4c0b2141fbbf
SHA174d5e54d75036be1369cfcb7ed207cfba44ee2bc
SHA256179ce6ce8ea73c2315b0082d3e717fc464267c6104679be851dde6fcd3401490
SHA512735caf333d14b71ffaaec77783bb9c1520c25d359d245be5b1227802a4cee2ac2e15330ed103e81989dc2fea7adbef13b68fc4f9e70683383f0eeadaae7b669b
-
Filesize
5KB
MD5f7d12541a56561d9db39336165254a8d
SHA1ce112fa5b60ec25eebec9ab997040e9a779154f5
SHA2567330f883478815d23f649017d4c9b360b66e5774c6331448a0b30e6c10a82a9e
SHA5124fadc5679f5b396a33610366c37bed636560428bffb2c01d0b0fdcb5fd628e3f2f9007ab1c0e28dc7913dfdb7e402afa8b6a79e46eec259337f94d02ba925ac5
-
Filesize
7KB
MD5a320989c7b074d6000f5197bd98a0c33
SHA1f49f0e9a71e2c56fb8552d331938685fa4d10dd3
SHA256e1aa7b05624af775eb9c5d636b7eacdab53eed68f177488b75fbad021590f7a6
SHA5120200672b4ccaf5539a9965f42d6248b4bae5e9c337cd16cee23c479c081d4452c502819735f52eadd14e98c32641af736f0ac262b4e30756706759a67cb9aa97
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5ca68efcf52461d48e0b3f56082871311
SHA170d60c251291b00c12cf434f144d715fa63e215f
SHA25661e7a791550a9a5bfcc02fe3d974cd33eba195484100bb96573dae40607b2623
SHA512b81b641c2c66a794cbc9907deb8ee03026a88216b9d66af91c7f6a69aae04fe85a0c51a8489a337a5c9e05f263e27900fe42c7ade1373479bbac02f340b75f8f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a604.TMP
Filesize48B
MD5037b6bc500ef8261ec80e2c78c2cef8f
SHA13d543ab418b86341d8b111f4f91c8d46c2ac1c9a
SHA256614ddbd8339567daccf99eb8028ace631a1f2a23e08123b170c0b156f1b844c5
SHA512d9c3a0bcb90cf0f3e39241da7a93d06889d676db031a64e62d4d246bcd41d012fc9778b81d91ab1bd7c8712e1c87c7ae79fdfcd7e25f9652f532252a34ffe314
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54ea02eab09e3c605afbd37e0d37caf8b
SHA124e56324d7bc4e51d60c3aee7c85f2de094337a1
SHA256617eb3a09acf2a56ade534701ba603471416c6047581044757452c80a3072adf
SHA51254f37121b427c7b23a6814fa9e7921894214dd4dcf7173509bfab1cf926953ad2a18545708a8ce16bd367401a25412755b4178921c49b8d2763ce212d4c16211