Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 13:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.hybrid-analysis.com/sample/f571b3feaebc562d846aaeab907243ab1f8805610543b21c8fb9844a626c1841/5c375d1d7ca3e11cb527ee56
Resource
win10v2004-20240704-en
General
-
Target
https://www.hybrid-analysis.com/sample/f571b3feaebc562d846aaeab907243ab1f8805610543b21c8fb9844a626c1841/5c375d1d7ca3e11cb527ee56
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 4848 msedge.exe 4848 msedge.exe 4292 identity_helper.exe 4292 identity_helper.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4480 4848 msedge.exe 82 PID 4848 wrote to memory of 4480 4848 msedge.exe 82 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1832 4848 msedge.exe 83 PID 4848 wrote to memory of 1464 4848 msedge.exe 84 PID 4848 wrote to memory of 1464 4848 msedge.exe 84 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85 PID 4848 wrote to memory of 2312 4848 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.hybrid-analysis.com/sample/f571b3feaebc562d846aaeab907243ab1f8805610543b21c8fb9844a626c1841/5c375d1d7ca3e11cb527ee561⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc656a46f8,0x7ffc656a4708,0x7ffc656a47182⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1125264554313597346,5342180037733629045,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5f1cf3eb170ce8e78839d39a950a904de
SHA170fd07c65ed857a34f2212d05c23711ea415e5a1
SHA256ae0d4f01efcc8be780d9f76003dbba269428bcb443c4b6d9b5c4a5235bdd2f4f
SHA51220584ab8fce915d9db64b80fcf7c1cc2c415363da68e4b312c064e7fa1bbe2b8fef111d1676834c55fb663ea53852fc3a536e1c836f6c95aa5fd8b18dab4652c
-
Filesize
1KB
MD51bc81bf63632c08cc2c12e4aa916f8be
SHA1488ab7cb4f67749c9ec99aad9c1aace98d612a80
SHA256040258cdcc7757f0e60e631049b826e2bc6a6613cd12e040d8241d86c05c2e39
SHA512ccb6ca78aa0c4b7a56202609cb9efc153d40ee3453fd3192f35878134cb52d14e08c29eb3a4153703a62ecdae004809fba2d8c0df0a53b01ce8d558b0613c962
-
Filesize
6KB
MD552105e7d526e4b8991fb80bc57fd4997
SHA17eda74a4ea9e5221d578eb9f3316935dd05d6406
SHA256a9faef74729e738d10af9c75d7d86c83f6b4683714d814f3a94e6a0c714598a1
SHA512dd1cec8bed87d324043a506ed686c2ecc32a7949be34027829c57fc8128da3f8cc634c05c34cdd54b3636e7006fc163856bd25c20ecdb4d4d2ae3026de56a1ec
-
Filesize
6KB
MD516fddb078537aab73235ce7ffc5e6ed7
SHA1ac2a3c5206dd05a29610418cef07b86983ad527f
SHA25693597043a5f417cee52861adc339b3c3f1989543071e8d3f23a13dd606c7f130
SHA512e4138aa09cfbccd94363739cf77aa4296b9afa67bc689077ed6f7ec9525be8230743da05897d48145a627751c6aeb1181b8989bcaeccfd124339c503bba109d4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c386d60a1cb6ddc63e167b0b2dc17452
SHA1dd1993a2013763339dc83639f90d49ec1a65a632
SHA25648e739abf77df08c6e88daa4af97f654f48bbc7d211f83628806cd5a4fe87fef
SHA5125d1805c72507b10c75ff5329c5adf9596facc8e3969d66cc1a963e2db44c64543bb271746773c212cbcbf8263f1068612c47ee2c5a2ed9d6375f6079c45c6ea5