Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
85s -
max time network
91s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/06/2024, 15:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1250761098576265299/1251098242222002186/ArenaWars.rar?ex=666d5789&is=666c0609&hm=8f7ca6e2fbd04fd9c14a3e3f799a78623e5d39bf803ba14e290a20f5b562cf2c&
Resource
win11-20240611-en
General
-
Target
https://cdn.discordapp.com/attachments/1250761098576265299/1251098242222002186/ArenaWars.rar?ex=666d5789&is=666c0609&hm=8f7ca6e2fbd04fd9c14a3e3f799a78623e5d39bf803ba14e290a20f5b562cf2c&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 4688 msedge.exe 4688 msedge.exe 1976 msedge.exe 1976 msedge.exe 1248 identity_helper.exe 1248 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 2040 4688 msedge.exe 78 PID 4688 wrote to memory of 2040 4688 msedge.exe 78 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 3348 4688 msedge.exe 80 PID 4688 wrote to memory of 2272 4688 msedge.exe 81 PID 4688 wrote to memory of 2272 4688 msedge.exe 81 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82 PID 4688 wrote to memory of 4060 4688 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1250761098576265299/1251098242222002186/ArenaWars.rar?ex=666d5789&is=666c0609&hm=8f7ca6e2fbd04fd9c14a3e3f799a78623e5d39bf803ba14e290a20f5b562cf2c&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9d6823cb8,0x7ff9d6823cc8,0x7ff9d6823cd82⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2472 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8768341911251931658,6560018825033166451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:4388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59a91b6dd57fc9c4880d34e9e7c6b760f
SHA177a09da6ef4343a8b232386e000cd2d6b9fc30a3
SHA2560170297f0103d4e415653f86dedc31b0827580042f86862206fd3f6f135b543a
SHA5129fc3b9be931b3edebc4a6809d62d805046bdceb4c27a7db21cfbbcb0e5e253ab529c54d64e465e60904a6ab3b83156e26b97f852c9526f46f037944f806a7f0f
-
Filesize
152B
MD5bbfb66ff6f5e565ac00d12dbb0f4113d
SHA18ee31313329123750487278afb3192d106752f17
SHA256165401ef4e6bbd51cb89d3f9e6dc13a50132669d5b0229c7db12f2ec3f605754
SHA5128ea206daabc7895923f3df9798bfd96f459bf859c78f3e5640fad550678b5090539f2a1b590883cd9797efee999acccac16d499772f61f5390e91bcc44d60560
-
Filesize
5KB
MD5396d97ae46894f4c1cca92276c0d9986
SHA1fb7a4bd029d6ae4d0366b66069795f0dc9df7955
SHA256a0030cc40538dd2385cec92af8707fcd1b207eb6635a15d9b86b6cfa71183549
SHA5125438dec67050dd473ca2d53bc7b70dad2eaee80159a4a8a04ead6bd8c1fcb3ebe6da3e182415a7725e0f101fa0b44e4cbc3e569a0ccb7125e69006eb11fcfabd
-
Filesize
5KB
MD5106a1ba91684d721a5312ede01c2fcac
SHA1603dccf7e3f09ea9a552132f02257d53595e19a9
SHA256701c6d9482c6ab42de0a54668bc18e728c77b307cf39c681d64507d6538d5185
SHA512e22e6a7318844bb03b64022b743a4a41606c57c5c0f65b1db89b16b741e53836671208edc7d521e5498d5702c0a6cfed3aebcd2b15c3ac03bf3694cdf914bcb8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD57a9878f0871fe2b3b38780808cd7d32d
SHA1eec8e42e15ea4f8bf4e9e6c4abcb16c859925c98
SHA25657aeb43478cde611462a25baed3eecfac1ce4192adf45025930f93b667d6395a
SHA512cd984a54b1d85db3c648fdeeda69e6a5a1b1e7653042d81f30e78bbab7e78dd5419b4489ab4d84530e8a63b7df5b269be5a47cd1cb1b471a51aa872e65873df8
-
Filesize
8KB
MD58d8b64c033686e79d3d9587e3f780c61
SHA1f39c07a4759575bfd730f1d9351fc8ec05a9549e
SHA256f4c3a753c452953d8ed312c8a59177a096df62e76339d6121d529e22d7e2469c
SHA5120796b2ee87f85e9dc72c1f37d01f220f9c0c3ae25aa95145c01ebf8d59fbbfed4e1d6dc27aab6d7592488737a34c462549cc358756bce271df0c6bd626ee9328