Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
57s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/06/2024, 16:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.mediafire.com/file/ias09asd1541/injectoreczek.rar/file
Resource
win11-20240508-en
General
-
Target
http://www.mediafire.com/file/ias09asd1541/injectoreczek.rar/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 900 msedge.exe 900 msedge.exe 3188 identity_helper.exe 3188 identity_helper.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4896 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 900 wrote to memory of 400 900 msedge.exe 78 PID 900 wrote to memory of 400 900 msedge.exe 78 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 4960 900 msedge.exe 79 PID 900 wrote to memory of 2104 900 msedge.exe 80 PID 900 wrote to memory of 2104 900 msedge.exe 80 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81 PID 900 wrote to memory of 2500 900 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.mediafire.com/file/ias09asd1541/injectoreczek.rar/file1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8a21d3cb8,0x7ff8a21d3cc8,0x7ff8a21d3cd82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,16807974422323254078,3148409995696915119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56876cbd342d4d6b236f44f52c50f780f
SHA1a215cf6a499bfb67a3266d211844ec4c82128d83
SHA256ca5a6320d94ee74db11e55893a42a52c56c8f067cba35594d507b593d993451e
SHA512dff3675753b6b733ffa2da73d28a250a52ab29620935960673d77fe2f90d37a273c8c6afdf87db959bdb49f31b69b41f7aa4febac5bbdd43a9706a4dd9705039
-
Filesize
152B
MD5c1c7e2f451eb3836d23007799bc21d5f
SHA111a25f6055210aa7f99d77346b0d4f1dc123ce79
SHA256429a870d582c77c8a661c8cc3f4afa424ed5faf64ce722f51a6a74f66b21c800
SHA5122ca40bbbe76488dff4b10cca78a81ecf2e97d75cd65f301da4414d93e08e33f231171d455b0dbf012b2d4735428e835bf3631f678f0ab203383e315da2d23a34
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5a25e7622f675185f9a30697b81c14ba6
SHA1dd225b02876d16c5651ad763584363ec3d625fe3
SHA2566f5274cb5afa3047ba91c74ca314750c5929497a7d556174d12c116867042478
SHA512f8f3d6c19d19c6120cf88d9bbfc5727edf02e30ff1c9f56aceeeb4be213f6fc0e072da3a53431ee2a53de6c43fc55d4db47bac95e2631877c45297030cba03bd
-
Filesize
5KB
MD5d091b743fc0a4cd286381ffefcd9346c
SHA115f655e2336484f40c89368efcb1825d37b874a1
SHA2560e376860e31bb83c28ea32de16e9c8b32ee806f8542967760892049abc0ffc7e
SHA51251dbb101565bdf3d4e1d72bc631f1f44c916ee18c1bbd583163cf27683f23b1281fa0bfb6446ecb0f3b8503c16e7d207e1451dcbb395499130a77df209290117
-
Filesize
6KB
MD5ff076121e11e052ca9b9051e8675e476
SHA13da267a93f2dbd0a232214364e51914729c87897
SHA2565a867f0c2f26ac922df5f931bf1bd66f99619826580464b37ea31270df8e98b9
SHA51247ae3bfc861b81b30a8503572838d33aaa9cc11c4b5cdecdcb9292bc5953b4ebf743c0c655518ea7a2a15175fd2533e5478711e309e3dee4a5aaf7530a6bc930
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD526f22daa52f1f0e75bff656c2e2dbade
SHA16ff80bfa02429717d29223e0fe9007def9037e25
SHA2562f417d70942b5cff88321db36e3e69e11626b285644c3541024d0de9ead79bcb
SHA512bcad2349501e8a9fcfac94511cd5fdf9a4f6991db24bf133ad9af393822b8c8919c009de8311e471007975b9ec5bef015d2263f0f1c64a283faf26e562ca1e47
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5cf4d76f1a9247b679411a23597ab0736
SHA1ca7ea2bb3f8f7be7c59eb122cad5b045cf4e9c66
SHA256552fdfebf5efd5e7e3373b9030d26042a53a28197c2955a8dfa3eed3479c6bbe
SHA512a21e03a0fb43eb2f50e2ee98e9eee1ffcda02f5e418352d567904c4ff33ca536c938f0cc46aa258bc6df37d34f05799bfc8c7d99a34afba789a2286ec1c47a91