Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 17:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://192.145.99.71
Resource
win10v2004-20240508-en
General
-
Target
http://192.145.99.71
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4356 msedge.exe 4356 msedge.exe 808 identity_helper.exe 808 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4356 wrote to memory of 4924 4356 msedge.exe 82 PID 4356 wrote to memory of 4924 4356 msedge.exe 82 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 3988 4356 msedge.exe 83 PID 4356 wrote to memory of 4836 4356 msedge.exe 84 PID 4356 wrote to memory of 4836 4356 msedge.exe 84 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85 PID 4356 wrote to memory of 3108 4356 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://192.145.99.711⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa82ad46f8,0x7ffa82ad4708,0x7ffa82ad47182⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,9507985563841711249,17499161069779933619,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5824 /prefetch:22⤵PID:4788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD5705ab021c84c89eb2b2c6ebaab73c288
SHA1ccab9007eebf9ec8d18af4a57206292300f8754d
SHA256ee141dd4e60983693b3ad8921fef4d08f21be048d25736df83831a6e6c8e6848
SHA5121718555677c5e860f0949c0276faa83db8b77feee70e4a8e7ca6bf373588b483d94acb08f0279b0c18c1305cac9fda56a1547f221aef999f0bc6047ad83d028d
-
Filesize
5KB
MD5af1961e654b970f80991bd35b5f14e54
SHA1856a86cd172b0baf36062eea796c7b6384a56088
SHA256af3ad3ed0b9c97fcfb8c833c2f5a1a5f829f8427e0ba03c41ebe173de40c9c73
SHA512591d4b634b35a9154020ddcfee1eebc6a2a6a9492f99086a37f394963c46d8a48f098200905a33bf3e483d29684cec4943a6c85b84770b51f742b0bac96880c6
-
Filesize
6KB
MD5b12e2227b5e0cd98e908f1987b5a30bc
SHA121105b2b671e8b68dad12b4794fd7e641153b728
SHA2561f88d6b25dcf0b032b5814985e16dfb0b84a23bce6b56d8f17cc7d345e2cd78f
SHA5121b7a89419116ec310f8e3652c00f4e75ab6eb84435e0d42c9ae4bedda5496f217868f4cd5163e5a6b7968c83c4e8c2b7ae48040510f6b75d696839c54a2a3154
-
Filesize
6KB
MD5e7f57d4a503c56d2b062bfe2fa207920
SHA1fcbd9791e6b4be50f6021e15894bf2bfb187b9e6
SHA256f902f2df6cd7b29f42c880679533d58e0c508341f64856bf6e590c458b4d859a
SHA5125a54c5fa50a6bfb61264db1796a9c4700c07dff301add8318d899371ebe71ee19c2ba6de223533503c4c34d796564d5007dee5e60d4d7f2dcb4775b22eef0314
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD535716a42ae7d4ed69e479457eb84fcab
SHA1c4337b8c537d37ae289aede98d38b3207031e709
SHA256b887fa7aeeb15345c71da79244bd7e8cdc64610960f2d534e184c430cd76ff9c
SHA512e4048185e3933265789055374506a2a73d94b0371286ddfab6429c89ab538a14b9bb8e7936090fdcc42f9efa0a301b0b3480ed520857ee145fc8c320121197dc