Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
322s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 21:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://culturaltracking.ru
Resource
win10v2004-20240704-en
General
-
Target
http://culturaltracking.ru
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 920 msedge.exe 920 msedge.exe 4616 identity_helper.exe 4616 identity_helper.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 4336 920 msedge.exe 81 PID 920 wrote to memory of 4336 920 msedge.exe 81 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 3912 920 msedge.exe 82 PID 920 wrote to memory of 1232 920 msedge.exe 83 PID 920 wrote to memory of 1232 920 msedge.exe 83 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84 PID 920 wrote to memory of 1744 920 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://culturaltracking.ru1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffad1846f8,0x7fffad184708,0x7fffad1847182⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2749109764254781602,7637821432667166234,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e81c757cdb64c4fd5c91e6ade1a16308
SHA119dc7ff5e8551a2b08874131d962b697bb84ad9b
SHA25682141d451d07bdb68991f33c59129214dd6d3d10158aeb7a1dc81efbc5fb12b3
SHA512ba8de0b3b04fec5a96d361459dde0941b1b70f5be231fdec94806efa3ecf1e8faf8e27b1800fa606dc4a82e29d4cf5109b94109e5ad242ddf9f4671e2acbcfbd
-
Filesize
152B
MD52e57ec8bd99545e47a55d581964d0549
SHA1bd7055ea7df7696298a94dedfc91136e3b530db8
SHA256a50ba35608edc2f3360cc71be0d4b29bba0e3382d1f08f24df5322ce2ad2443c
SHA5126b9b73d983c472149629c842e16e4f7c2f8a0a3bb6dd64837ef647db810ef1beb3a02b15dc1eec2c5de8aee6b3ca195c7d26c432705061c5b0ec7841a5bbf106
-
Filesize
80KB
MD57a40c93046dbdba584c6dd907d43701e
SHA1d2c8070a41c9ff7703b399ed237e34f928ccb27b
SHA25614a76d84a155acadb5d84695e7e6f2ba8042d2527fadf4e71ee1c84581164e8c
SHA512323236dca1953f8c0efc9d4839e028cbe003510bef30da668b23f2048f3075ddeb8d7a9f33e2bc9c00c366d9bc22dd7acfcf0617fa7ee9f7f7ed9efe786e124f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5424e7844412ba9cdc11517dd2cddd8ee
SHA1a78fff193fbe530d181cb2acd2b4a972b33c28db
SHA256a33455f43e6775bf13342efb4818c63cadae7a479f06aeb264a4f536279b07ec
SHA512aa445eed627825e489f6f8ed75a36dff7e3b6302be43b126f8b6af61823170e08dc173b42b283c0ebf25241aa30c22e4b806facaae0be7310279f5245471fbc1
-
Filesize
6KB
MD533789377eea0d685a8b227cd9b234994
SHA1809fa76a2cab443eaaf6e97bc763b84e01283dc2
SHA25684b3480f83cbb6d12baa35fd6149811b9da2b5a6fb6575a337f0c8c4b9b4dfb1
SHA51200e33b666041b8f57899e99e782b44c094cf8fe3e1b3a546f20da2d57ba1bc2abcd4aa993d3393c92b85fca230cbdf0ed4e5515e00800d3398391792026b5671
-
Filesize
6KB
MD522020505c7044df7f80ff68461bf76fe
SHA1f9862cd5373fb6ab564849ef824de5a9745d4f8e
SHA256232633eed82af90da3a30bd22e3fbb637f841a5f5548e6a5443e4677cdccb51b
SHA512fe6d7a1b593fd257f1f068ac0735b23b3648dbd81fe7ac01e3b61893cc86fb1e386cf9d2a68cd9c24e4ea9c7561416dc3e4fe567fb10b8b828466d713b7bbbca
-
Filesize
6KB
MD54bfb2cfdbde772f5f6ed192a26193d44
SHA12e183a4eab81b83b383052408d96817f31c6d709
SHA256ee2065ca6b34bcae2d6d28246ad00096f2849796307282438906a12509776dfb
SHA5127ad1ac55f225b6c26653eaf764a3d746c8ba21568f3e60c405e5baf653ca07ff731d8be53dcc7119b2da1632f0d38d089ae9fb00dc94eca979851f9211f50e66
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c661454f79873b3f17c3ef0405af596f
SHA14ca8e82bea5402a2e812be8fb710c073be96d192
SHA256ee9b26bb3661a031b5729681dd47cbdd3d0f2fd7e5538c8e874ec6f84805e54a
SHA5128e25eb4dd741b6c31294183bc2b44ecc5edb80b2763093fe591a7401338928e6701b5d01b960dba3c00deacd0f7bc5910cac918a040c4bb0e452bb98527a80ef