Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
538s -
max time network
509s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 10:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://uniper-vip.com/#/register?ic=350173
Resource
win10v2004-20240508-en
General
-
Target
https://uniper-vip.com/#/register?ic=350173
Malware Config
Signatures
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 2248 msedge.exe 2248 msedge.exe 1564 identity_helper.exe 1564 identity_helper.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 4168 osk.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4168 osk.exe 4168 osk.exe 4168 osk.exe 4168 osk.exe 4168 osk.exe 4168 osk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1616 2248 msedge.exe 80 PID 2248 wrote to memory of 1616 2248 msedge.exe 80 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 2584 2248 msedge.exe 81 PID 2248 wrote to memory of 3376 2248 msedge.exe 82 PID 2248 wrote to memory of 3376 2248 msedge.exe 82 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83 PID 2248 wrote to memory of 2756 2248 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://uniper-vip.com/#/register?ic=3501731⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc752146f8,0x7ffc75214708,0x7ffc752147182⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,1748086675790696678,12271384643135103244,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD504ed95322143db495c727927bb58daca
SHA1b6b62ba331ab821e2531e7c1c35ba8edd26c33cf
SHA256f52c914e4979a08234f0a569d86a9792c10c67d9e2a81bacb02d04d0f99f209e
SHA512a997c028c870c61a7790758e5801681192bddfa611ffdee1d8c1cb5b8de2b184d8041ce34d5e761e9997063698bc502a905f47239698dd0105460d4f5d0cdb61
-
Filesize
410B
MD598a2dfb3955eb00d541551be7ad134aa
SHA14a6a7880d555ecf4413854a6d22e9e74a02a170d
SHA256d873707b519a9c46266e733d8e7a3ae6bcf838e7e6e53662516a828f35a6ed52
SHA512a9eaeb9bc67b5ab4df07862752ff6b656685df7d38b9c99aafcc394b3297aef7bb5a051e355c0c948085b5d4da0ea408ba58724981cd17948c98649bd2b09874
-
Filesize
5KB
MD53f8d7ccc16a9ea9c14a0b80f13f0d132
SHA12bc2305cc06d5e87f065d345d8d0b9c00676f6d8
SHA25669dd016a9a08ecc9e2d2f26838a904c99d357823126d9d6fac2a7820f6992de2
SHA512ef561ecae4ac88127936f3b55a2418c97f48db21a2b4cf728bde4ab0954fb892f8886854b966b62bf3fe0783d58fe77ee1e96ffa0c2f80c47b31fa2c52085235
-
Filesize
6KB
MD58579df18884e3744a05dd72baeeccd6a
SHA1a0090312ee462027ea187100d996ed5b5f154c48
SHA2560f7acdacc0434911ea0dbff803868859b326d19efd091c4421772d12c13c766a
SHA512dcb7c111e6657fe2fb1963b721589e3cb681af2973551fc814c6abb61cdf9cef988c820499fdde45d4e56f85f37869fa59fc3b7d8ef817f3622079882c067fe3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD529f4dd7b874ab796f6e3961567440c0f
SHA17c740dee0c7168ca949a22bed057a4912ac3acc5
SHA256920c86272e2b6695d7db5e56b4c93baafc597026dcc8bf90256f3fb614b5df02
SHA51251a29562c2ac9b31685f31034177310fca5e8e3215213ed1ac179ad3ed84090352457d4e84d52488f8c8d412fb2a77950d81360844f9d2e1c51d29cad64ca7ae
-
Filesize
10KB
MD5bdf25a6612d9d06ec6bc5370208dc1ca
SHA1cd4e3722b36c2782b7752dd84b3844f820c5a0e0
SHA2562f682dbbda8e6de33409dce819d6025fa1b7f9baf2e68b5fe626f44810718a35
SHA51271579ccf1909577e96d06de297be5e6b8d383081be2b1d5f3508f10adfabf0a3c0de1db0c6900ebf2a6972be8e831292c3732318137e8d0347e7a59ba82bde76
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84