Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1760s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 22:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steemcommunlty.com/gift/activation/feor37565hFhsde2
Resource
win10v2004-20240704-en
General
-
Target
https://steemcommunlty.com/gift/activation/feor37565hFhsde2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 1044 msedge.exe 1044 msedge.exe 2732 identity_helper.exe 2732 identity_helper.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe 1044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1044 wrote to memory of 3284 1044 msedge.exe 82 PID 1044 wrote to memory of 3284 1044 msedge.exe 82 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 4508 1044 msedge.exe 84 PID 1044 wrote to memory of 2700 1044 msedge.exe 85 PID 1044 wrote to memory of 2700 1044 msedge.exe 85 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86 PID 1044 wrote to memory of 2216 1044 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steemcommunlty.com/gift/activation/feor37565hFhsde21⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb11d046f8,0x7ffb11d04708,0x7ffb11d047182⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,2356660150837269199,9677467938732744624,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4620 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD56777a1a471f581ca466f1c99a90b6965
SHA1d2ebfb447b4e43ea76ddadbc3fc964a78ef159d6
SHA256881f572fe066b51683e382ca706d51ca4400f25bdd31802922f7a9399e78920a
SHA5124f9ca716f4b7033010a2830bc303e17dee1147a17bdf1a6597710d141dc97dafc1b7f7c1a28888df4186094949aa0fc09c0421263079983a339dcf9906e9d247
-
Filesize
1KB
MD5234776e6811b0952e8cf7dafe9d29b77
SHA1b2903f173c7ae7532049cee6d37538a4603703ce
SHA2564a9e691462e49950ca764cdd5e39e9af28e138d4de1c28a8138b34d879d40a9c
SHA512052b33d7f0ec40db3ab1ba01d7afb5dfaedfe51938cd88069925b6ee7397f277a8f2b38da3e72a07073d8347ceb423a8036d30e63ad4881a565b5f2fccd5b406
-
Filesize
1KB
MD5b5a02eaa3208ef821494233e714bd280
SHA1b97b2a1e3807461ecfd6cb4b82a11741d24dbb0f
SHA256e2fbfaa4957cdd400bf0d0820d69e35d6e9a2aaee5a99dfb53d80e970dc1f6c0
SHA5122afa775e9bfc68e1698bd4ea04e33c290948a7a138978756de0f422713ccd407de5afaa9389dc98a49b07e960e868353c7fcd8a94473c9e9f4a5c6e7dc2ef3d9
-
Filesize
6KB
MD5a3fe1461a755ebb8dce82c9f45329129
SHA19946e74d37409f491542e490d518e596ce849009
SHA256c96c6ba70149b0800161435390fd0ac2317ca3cb178c7c578aa9de47d0e18e97
SHA5127a01faadc7cb6123c146990c0bbdce478049436c1a8580645ab807c5560bd94c6dd431d9668831265a51d0079770f9203fa8709959c90d532ff03995e1692b13
-
Filesize
6KB
MD533c2c26bee1ca7b3c5c8754197911d72
SHA116430a27b0aca1cf0e379c47596e7fbe9d5e4802
SHA25621abe538ec3aa7c7abe7c89d5da6215a3a16ac3ff5d0abdc0293dab7504dfe07
SHA5126e498190b89833088a84be17ea0fa13c275c549e144ac8db180749d3b245412595ee7346076cf2f97630be244deb12838b2ca8d2e58a60d97c4fd1735ceb49cc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51832a2b43fd1a5ae360346f6277f21be
SHA121ea065e9f58f0bb2793cf67b2413e9accf6a274
SHA25667d4f87a072d6228d3c04d5a95fc318b96a69e674e13aeb8589eba245a3c9877
SHA512bef9e3d608d407bd2f301f2b0b1fbe8756920f268e3c1de9849c9d6b15913a539b0025d4c8888dc66d04ea10bb20aec89d46cee980a7c52aa6e14296bc21ebde