Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
16/06/2024, 11:18
240616-nenkcs1end 116/06/2024, 11:17
240616-nd39esvfjj 116/06/2024, 11:13
240616-nbtl7s1dng 116/06/2024, 11:10
240616-m93gbs1djc 4Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/06/2024, 11:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/4ebMbZF
Resource
win11-20240508-en
General
-
Target
https://bit.ly/4ebMbZF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 4952 msedge.exe 4952 msedge.exe 784 identity_helper.exe 784 identity_helper.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 1424 4952 msedge.exe 77 PID 4952 wrote to memory of 1424 4952 msedge.exe 77 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 868 4952 msedge.exe 78 PID 4952 wrote to memory of 5068 4952 msedge.exe 79 PID 4952 wrote to memory of 5068 4952 msedge.exe 79 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80 PID 4952 wrote to memory of 5080 4952 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bit.ly/4ebMbZF1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbae5f3cb8,0x7ffbae5f3cc8,0x7ffbae5f3cd82⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4348 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,9036985697941715133,17416268269404274562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:4420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50d84d1490aa9f725b68407eab8f0030e
SHA183964574467b7422e160af34ef024d1821d6d1c3
SHA25640c09bb0248add089873d1117aadefb46c1b4e23241ba4621f707312de9c829e
SHA512f84552335ff96b5b4841ec26e222c24af79b6d0271d27ad05a9dfcee254a7b9e9019e7fac0def1245a74754fae81f7126499bf1001615073284052aaa949fa00
-
Filesize
152B
MD50c705388d79c00418e5c1751159353e3
SHA1aaeafebce5483626ef82813d286511c1f353f861
SHA256697bd270be634688c48210bee7c5111d7897fd71a6af0bbb2141cefd2f8e4a4d
SHA512c1614e79650ab9822c4e175ba528ea4efadc7a6313204e4e69b4a9bd06327fb92f56fba95f2595885b1604ca8d8f6b282ab542988995c674d89901da2bc4186f
-
Filesize
5KB
MD509eb7f6ba6525904320320c95452439e
SHA18669e1f414be56d4f4f196afeb87fb460d093b17
SHA256e4f6b96fcc6cba4bfd611184f3992f7d6a766a9a41a5cc78400e2dd568f7b1ba
SHA512f31647ea96b61957bf21cec5365f3b422ebf15138552cf9b1ec8a157eebe4589e2849bb90b19e1960263308ba6be8c4dcf87c9536db822457a22fec7fe040465
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5f360cfeabd22952bebddbaa08a884761
SHA174e47361c4a42f3574cab34d5e67c8c43c00a789
SHA2565a9d9a9e9e2a94d919fe48a263fbeb94823dc244cf18db361d29994a9302be9c
SHA512dcedd42480a5c64bac162fefbfafa57e5053c7188f4429963aa069eaadcd4f68e90d129ecb60ce9cff09ce6bd258c50e930afc1ad1d7d060cad341080c46a9ca
-
Filesize
8KB
MD5930cc2f386962ce0f238caef5bbf364d
SHA18a9fa2fc2e87a8615f03a2dfbf232246df1f43c0
SHA256d5d091ffb70dd6a62e2062f6296094273383dfe733397440c00926d888353c3b
SHA5129e91648f40a141cc19c98b42a29c96aec438048f2f43459edf255da68620a763e724426d279bcbb6fa7000b18aa6b176a54825b79fbee31e7bfec711f80819d3
-
Filesize
8KB
MD576ad7f0da025acbb08ebd0da8094f9ea
SHA16b39166c18b583167b6855020b15e254a2535215
SHA2562367a577907a917cb20db7a12004429ccf8890e643dd2be33d703e7e234fac5f
SHA512646d9329a97ef50f4f64327eda49ed87121cc2b22726b741c5e6a9a1bb9a83cd84ab028cfca5ac7d6c06d021bacc0b346d87198ad504cf58937aa65a3c8558a2
-
Filesize
264KB
MD53166d0f52d8541bd46a4d7741d421d36
SHA1403bcac802aa3f8b534cc00178950e5f7e4c86fc
SHA256e2b9a9b2e21b79695d21a8e7051f1e95f3428c6eed2e1f50ea79c70a4e734537
SHA512a316014e2939dc59ca39536b96f32f6f7c01ae7edd61b5c778565745f1d6de245dffe66599a80500c6ef886b3882dd9f4035a317a31967b9702186ccee938f09
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5a71ab244d565671f741686cb2c5ed11b
SHA1b6e766a85f1f878d512f752df2dd4873971755e2
SHA25606a5716962f3b50a8aa3acd30e33d6c75664465c3d795196ad6dce5e33a80faa
SHA5120826c8e52b0f5dbcbda745f06390fd59ce9eee8e0e845cdb007f4a97b19065f2544ca63226b34d361adf9e1cf26644672abfe5dcfd75651cd2aeb1ae27f16f84
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD544408d8bcd8c4ffe97a60ddf16281885
SHA1ab8773e27c92a24e12969dd4dc6bb8422f15d589
SHA256a6047cddc1126bc128da907db3550e725647640752e6a5c71ce9445735a9e83a
SHA512ff4e382bd3d00515f57bb735c6ffce35afd9f63a8def25ba18f722e618ac9f107e31e0ab44ff7758394e9ca7f52bc67b0ba70710c4dfd6afdb470a34093a35c6