Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 04:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mos.jp/
Resource
win10v2004-20240709-en
General
-
Target
https://www.mos.jp/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 1640 msedge.exe 1640 msedge.exe 1752 identity_helper.exe 1752 identity_helper.exe 648 msedge.exe 648 msedge.exe 648 msedge.exe 648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1008 1640 msedge.exe 84 PID 1640 wrote to memory of 1008 1640 msedge.exe 84 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3468 1640 msedge.exe 87 PID 1640 wrote to memory of 3968 1640 msedge.exe 88 PID 1640 wrote to memory of 3968 1640 msedge.exe 88 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89 PID 1640 wrote to memory of 4716 1640 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mos.jp/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd219246f8,0x7ffd21924708,0x7ffd219247182⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15104658797756899690,17815156217307343911,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD54c2e630857018637c81da5cedf845d98
SHA14bc8d52d3a8de96c4ec0ed67df2c6d6d294105e4
SHA256544f8187394e85676a2ee062477bed204a13c40cbd1b4a16ffc463694f2e71f9
SHA5123e685f7ef102114a93a14b0823bc9bd951c4bf2485a0a8764e90b1b774f4e49bb34f7fb9d648e9d2e980609b4ae61a90793364966d323480cc437ff427ad93ef
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
2KB
MD5e4aad6dac2e84e18eef444c766209b38
SHA1e0d8600cdd056930c3a262e612067e2977f89c0c
SHA25635cce581e90556468624edfd60648c30834dc1a323e6369d23d16e089aa59fc9
SHA5125d93cec7f8a9dd236023b507b3673b1ebd54cf7ef2ebab1b05195d201fc40f13f4dbec127807aa1f92aef9c82c7e7dad813cf40214a4ca2e4d22b7eb5eb20853
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5e509005b271ebb075da7e67bad002831
SHA16d23643d42fc77c4710bc30ba9af729219ed09e8
SHA256b58f665aa520e8be827edc1ef1e9b2dc0cccf95383bc6d3e88522e5b504c829e
SHA5122af90ea5f1741996a65d6895953e98f21cb4332bb4ba70a3c1d98bbce34eede861d4e58053c9f3bf92bf7aa5c03fb26c420522f288856f21041ec8b97cf0d043
-
Filesize
8KB
MD5374cca13af4fc3964827ed5abe83af22
SHA1867734231ffacebb6220c54e4b2f88fcd7f6ee72
SHA256b0d417e341c26b3820037ec5518c8d42fd2b7e191328cff589d84e2cc13733ea
SHA5126e4e2899842ede3c27179c9cd840a3f911d70e77f89725801aca68ec8c26dfabbe9c38415328aacbbe0a33b043788a02651cc60b009a00b4e8227e4bfdd91cbe
-
Filesize
6KB
MD5522229331f744384b8930eea48f04a74
SHA11c1b148b6bb09c50f73e4b527bc1c2c80fcba4f1
SHA256acaadfb283e9281a334fbbacd8f184da4fc542dab15c0c5090f3047b2b8cf07d
SHA512e3f916da85ed35738d4ba25f471b8810b54c702cbab12eb57ae3774f93f4f44c2d41ebfc5608ec1f4bc7d2d7234fd07ca2d430a769837cd782d357542b3d6b88
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5b1a4ccecb8203b58223c33a69bebe377
SHA19e13117596df826bd68637b98092bacb4953036d
SHA256b68101c5145816a4cfaf7423d018dce6a4c432516a0fb5318049a8b6d4697ccf
SHA512f993d6d67be674c2e433da70759d8160f3abff2cdf2dd9697fb4879083a038a7253d59619e94ea035dca4c1427cf4e457b6bd19afd27a43282be7f1deda73486
-
Filesize
11KB
MD571adf1cf0ed186ed9cb21ad673f8b9df
SHA1e71a7bcb3688929ed69f454a51cdd26912a9a178
SHA256c0668e9e469ac05213d4ff009e534fe415d6ee64053ede1219d8f1771e0c962b
SHA512c3f953c53ca8e057425c2abb63d0b4a0d007441af0dd839a62d8d0c0a528ef469110924baeba771e7564fbfc3e594dd15ce5a2c284376ebc41ec56d840759967