Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/06/2024, 14:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fizzycheat.fun
Resource
win11-20240508-en
General
-
Target
https://fizzycheat.fun
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3740 msedge.exe 3740 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3904 wrote to memory of 1220 3904 msedge.exe 77 PID 3904 wrote to memory of 1220 3904 msedge.exe 77 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3120 3904 msedge.exe 78 PID 3904 wrote to memory of 3740 3904 msedge.exe 79 PID 3904 wrote to memory of 3740 3904 msedge.exe 79 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80 PID 3904 wrote to memory of 3840 3904 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://fizzycheat.fun1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbae5f3cb8,0x7ffbae5f3cc8,0x7ffbae5f3cd82⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,14331515834506889328,14755841190908607313,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,14331515834506889328,14755841190908607313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,14331515834506889328,14755841190908607313,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14331515834506889328,14755841190908607313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14331515834506889328,14755841190908607313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14331515834506889328,14755841190908607313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14331515834506889328,14755841190908607313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:1972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50d84d1490aa9f725b68407eab8f0030e
SHA183964574467b7422e160af34ef024d1821d6d1c3
SHA25640c09bb0248add089873d1117aadefb46c1b4e23241ba4621f707312de9c829e
SHA512f84552335ff96b5b4841ec26e222c24af79b6d0271d27ad05a9dfcee254a7b9e9019e7fac0def1245a74754fae81f7126499bf1001615073284052aaa949fa00
-
Filesize
152B
MD50c705388d79c00418e5c1751159353e3
SHA1aaeafebce5483626ef82813d286511c1f353f861
SHA256697bd270be634688c48210bee7c5111d7897fd71a6af0bbb2141cefd2f8e4a4d
SHA512c1614e79650ab9822c4e175ba528ea4efadc7a6313204e4e69b4a9bd06327fb92f56fba95f2595885b1604ca8d8f6b282ab542988995c674d89901da2bc4186f
-
Filesize
5KB
MD5cb8e998ee2d9c98af2f2ed326865238f
SHA17dec841c511840ce9ddcdfd87d8e6b4b33eb293f
SHA2562c052aba2a50f4ab064f2fa6aa99c16a60b76651be4a556d12f03c290822f7fc
SHA5125b566dc41dd84cc21d350b3f8bf88c15350cf2dcd5e92b4aa1fddfabf881fde6931ca1403594a9edf6dbc561a9e28bbff5cbd12db43a06d815091c25c779d9a3
-
Filesize
8KB
MD50b60363a1bce02e59091862a10c46561
SHA19124603ff428f53d29fc789c65a89759ec108f44
SHA256252e979552d6e012b53accf5e3823092548b694f163ee7102ec785f0636147fe
SHA512df3dede95f40a73c1bfa8267b2815499e055a85dae57837e9eb63102652faae4116a32cedecc701f1aa52f1bea002bc58fb3d79a5fb983249a0be8fde16513aa