Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
20s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 08:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://leveluprewards.zendesk.com/hc/en-us
Resource
win10v2004-20240611-en
General
-
Target
https://leveluprewards.zendesk.com/hc/en-us
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 548 msedge.exe 548 msedge.exe 4864 identity_helper.exe 4864 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 548 msedge.exe 548 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 548 wrote to memory of 5048 548 msedge.exe 82 PID 548 wrote to memory of 5048 548 msedge.exe 82 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 5148 548 msedge.exe 83 PID 548 wrote to memory of 3908 548 msedge.exe 84 PID 548 wrote to memory of 3908 548 msedge.exe 84 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85 PID 548 wrote to memory of 572 548 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://leveluprewards.zendesk.com/hc/en-us1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb53f46f8,0x7ffbb53f4708,0x7ffbb53f47182⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,14071429046305268484,6193770270375991259,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,14071429046305268484,6193770270375991259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,14071429046305268484,6193770270375991259,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14071429046305268484,6193770270375991259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:6036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14071429046305268484,6193770270375991259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,14071429046305268484,6193770270375991259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,14071429046305268484,6193770270375991259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8ac7798b-67d1-410c-88c2-dc31be8d56e9.tmp
Filesize7KB
MD59a47473a3da9a34d68ba486e55da0626
SHA1839e7effd7c6e64d62a58dd1f0c4d86a7e17b9e9
SHA256daa64538325dde7844f039d040a728f29875db8919e9267feae601c7cae218cd
SHA512d18447e318ad1176f2383fc56c432f572c149e68f483a93d0877efc8fecbc96e9945a6c8fa00ad3c4f8ef6e927deb74da8197f44483723ebad718372d2756ffd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5eaee44645effb2e7d38b61ec533feebc
SHA1adb6c7e9d9b8c2fffb897e997c8a4aa84b7f4a3f
SHA25683ff052c2074516da3388aef6258859d4f9bbbbd4343ab3e0a17fe44fe43768c
SHA512041cc3b5c8cdb27e97420e25306d04807767cccad70bd2b67ae55826b85410493792706402ba6f1dc29abab86eec50e594de6f25206b0d70141c20d512968829
-
Filesize
621B
MD516d3771837c9cb588f4a0201ec491aa5
SHA1bd43ab0ada644a83385dd172a7c0b2564201b2a9
SHA2569f3e8e96f26d554c5b22ae2dcedfd2caf2b55249de95fc2bbd4742597eaab0da
SHA51243d12bb77c9bad5d6f79ee9b135b772cddd7c6d044fe936200d6478aab5a908e91d64d9f255b281e6417191f15785991500b162626e804d8a9c38c52abb720a2
-
Filesize
6KB
MD56368105db4d1bd946db96230ccdba127
SHA197cd414c431803294c8de6dd8a61428d778154b0
SHA256b0b015d4c488edc4579f6703b449cefd40e38878983e6888ae56e28b71dc613c
SHA51223f34cf0a0511509e355c784a01c5718c544b44a0fb8d33e2519263df79f2314aa10cbd8a2cb5ac80184ebf9dc13a07d69182182f3613514257fb4ba350ebca1
-
Filesize
5KB
MD5da66b2bcb1bca8f64d3312ca2a169dd6
SHA17e3663759ed2fbdba28fe830f47cead88ff555a9
SHA256c66400d95e6d7d5007e8d2519cd24c54641f881c681207daaa6222d3f2441ba6
SHA512b4a9b13ddbb8bf5610a7b42054ff8be0efc54d937430ca29d8d6faad37cf63c95fc28262e8ec670356c77421f6275a7b16b36b33bee0dd1f23b0612703d2217b
-
Filesize
537B
MD56ddda47ee7127d572afe62906153903e
SHA1cad771f4d4c72e716a9bffc92e54305a5890ebf2
SHA256c9cbdfa7a1ff2e2f970a01952e7c2413681f7a39e565bcd2b6869f0f92685c35
SHA51290f1fa9cff22bd318dc1b5f103aed8ffd2e7a8569ebca5ece3fbc26f16dadce4a6d71f05e2606c981ea3b4a57fb3f88543d84463b9ae00b90a6da85c9147a907
-
Filesize
537B
MD59b17d2ff212b11b25156c222471c99b8
SHA1622192606d69dc216d71a4df06b1c260a7cdd4ba
SHA256deb005ed03a58c9672dceef432e0329c43fa7844a727aba5daff674243003692
SHA51273b10d58233fc51f56223b3b7f7c41526d7b424b51b5f08b1b4656e881608227ab265f0c045fd771fdcf046e3b311c97d70a4503248014b0e244ada070c08a81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57edeb90ed9275aff9a97118c8584edbc
SHA1a0913ea0fa244930ab7ceb062260a8053501023e
SHA25604d8c69c773c112de103a9a69c0cf8510f8c88e42e7bb0115504c84235516772
SHA51272e6682666f9986eec3a8982c11565e2529a7eaae82edb48a0fe7439fe672fe89b9ea2cf78dc2d193716311a1a8d8800c081168869659948316d908109485ab5
-
Filesize
11KB
MD5f9673b41c698eca271e09ee269918345
SHA1eefa4c41796038433ab95aff0f5837b2ff154b75
SHA256e79cc338a40688f342eab43cd9f7724ef6f541b63de4c9f0f1d681b6f8377aa9
SHA512142ceae18fd76c3bbb7ed8ad6ca9bbfc05808d2c64ea55fa865d63532846d9f4d3b58da80d31ad80b0945c35ac714f3e3978293fadb2e85ebce511827e8eb346