Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1797s -
max time network
1684s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 17:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://discord.com
Resource
win10v2004-20240709-en
General
-
Target
http://discord.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 discord.com 9 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 2760 msedge.exe 2760 msedge.exe 3460 identity_helper.exe 3460 identity_helper.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4536 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4536 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 940 2760 msedge.exe 83 PID 2760 wrote to memory of 940 2760 msedge.exe 83 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 4908 2760 msedge.exe 84 PID 2760 wrote to memory of 2720 2760 msedge.exe 85 PID 2760 wrote to memory of 2720 2760 msedge.exe 85 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86 PID 2760 wrote to memory of 4080 2760 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://discord.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb7f2746f8,0x7ffb7f274708,0x7ffb7f2747182⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,11913469041831796912,1174001091619306521,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4bc 0x5041⤵
- Suspicious use of AdjustPrivilegeToken
PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5217915b8a3b6af008d0c80250927fbf9
SHA193c476aff44a686bc549740d3cdff91986f7995c
SHA2568e7c504dc0055360528379499dbcc3c418e303b871dd362d84952b985f9ae0f6
SHA512ece6a6f98cd153d122cb59d40bd3346ff7b8124a7f331aa9ae9b51265a3151d3aa15c6848af3e51584803db85c6b898d336ad69b0159bd57202aba4b483bc679
-
Filesize
1KB
MD55a982ffa77c9dfac360c8365eba51101
SHA1121ba9ebcdfa4f5466e21209c97cdbbda6b3b205
SHA256221e8638e97f54adb495ee2b4c93ae7504ccaf988ff37c721fbe6974a7107fca
SHA512dfd1ef8cfcd152dabadd5ab8202a150fae4bede534aa2a82e0d189ef83c00d9fa8d890beeb937de41dad95d1ba14c121b454f6829443dfe95dc95a136be44ed0
-
Filesize
6KB
MD5577e462af355c2d58a5d4e3c567df19b
SHA1431be3cb3b55da55617ed98fda8531c569333f6f
SHA2563ccd5241b8b02764a22250580d9df4ac3d76e802f2d83f89a57f56a306ecbb77
SHA5128fce00a8f09905bf5612316372b8e33a060b7e5a9fc5c1459c3c8bed910af15c8b5f005c0630a59cd2089c392df31e4a436baffc81e5948abdb335f803316730
-
Filesize
6KB
MD50d0e19cac1de8b17889d454cd147997b
SHA123de677922286a567d243aac7d791a260fe69fa0
SHA2566f3f1284d71cd10dc2b7ac434d1a086772d255bae9a5b1ec6f1cc2eace2b201b
SHA512860b7aff9de223642a7a41788c65b9b1db2e9340f59978a2cb6908b8f2d9518fb3670294c033d09dca57663ec6a76554dc317b23ead354d9963c917f330e1ac4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5748cc40f6776c28d6317c22e0ba50653
SHA12407eb589d2ed0e4d7c377b4e0a203d9eb081384
SHA256374a118514953b5c98f6d48df20f16cdf814c06943ed55ba20324f86bcc0e877
SHA51218b8f87848ff94ba9df639cfc7324cfa420f23a7ddf0885b7a459cf4f5e6b57e5f9ae84df49ff1787e073415a20443a133272592df4c3316598317d3c09e553f